-
Router Security Strategies: Securing IP Network Traffic Planes
Author David J. Smith - CCIE No. 1986 , Gregg Schudel - CCIE No. 9591
Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced tech....
Release Date 2007/12 -
Author Eric Seagren
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get thi....
Release Date 2011/04 -
Placing the Suspect Behind the Keyboard
Author Brett Shavers
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work ....
Release Date 2013/02 -
Mastering Wireless Penetration Testing for Highly Secured Environments
Author Aaron Johns
Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionalsIn DetailPenetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By ....
Release Date 2015/01 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Principles of Digital Audio, Sixth Edition, 6th Edition
Author Ken C. Pohlmann
The definitive guide to digital engineering--fully updatedGain a thorough understanding of digital audio tools, techniques, and practices from this completely revised and expanded resource. Written by industry pioneer and Audio Engineering Society Fellow Ken C. Pohl....
Release Date 2010/10 -
Being a Solo Librarian in Healthcare
Author Elizabeth C Burns
This book brings to light the current job responsibilities of the healthcare librarian, but at the same time reveals a dichotomy. In theory, advances in healthcare research promise better care and improved safety for patients. In practice, there are barriers that un....
Release Date 2015/05 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Thinking Security: Stopping Next Year’s Hackers
Author Steven M. Bellovin
If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re a....
Release Date 2015/11 -
Social Work Visions from Around the Globe
Author Anneli Pohjola , Pirkko-Liisa Ranhalon , Teppo Kroger , Anna Metten
Increase the effectiveness of the services you provide to clientsSocial Work Visions from Around the Globe examines the fundamental principles and dilemmas of social work with people whose health is under threat. This valuable resource was compiled from materi....
Release Date 2013/07 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Cyber Security Policy Guidebook
Author Joseph Weiss , Jeffrey Schmidt , Marcus H. Sachs , Paul Rohmeyer , Jason Healey , Jen
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers ....
Release Date 2012/04 -
Unmanned Aerial Vehicles: Embedded Control
Author Rogelio Lozano
This book presents the basic tools required to obtain the dynamical models for aerial vehicles (in the Newtonian or Lagrangian approach). Several control laws are presented for mini-helicopters, quadrotors, mini-blimps, flapping-wing aerial vehicles, planes, etc. Fi....
Release Date 2010/03 -
Security Policies and Implementation Issues, 2nd Edition
Author Johnson
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Second Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational....
Release Date 2014/08 -
Under Control: Governance Across the Enterprise
Author Jacob Lamm
Under Control captures decades of business governance experience from many of the leading authorities at CA, Inc. This book sets out not only to explain the essential challenges of effective business governance, but to help you build solutions for your organization ....
Release Date 2009/12 -
Information Security Governance Simplified
Author Todd Fitzgerald
Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how....
Release Date 2016/04 -
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Check Point NGX R65 Security Administration
Author Ralph Bonnell
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and ....
Release Date 2011/08 -
Mastering Kali Linux for Advanced Penetration Testing - Second Edition
Author Vijay Kumar Velu
A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.About This BookEmploy advanced pentesting techniques with Kali Linux to build highly-secured systemsGet to grips with various stealth techn....
Release Date 2017/06 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
Author Janos Gyerik
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.Gain an understanding of what version control is, and how you can benef....
Release Date 2013/06 -
Instant Penetration Testing: Setting Up a Test Lab How-to
Author Vyacheslav Fadyushin
Set up your own penetration testing lab, using practical and precise recipesLearn something new in an Instant! A short, fast, focused guide delivering immediate results.A concise and clear explanation of penetration testing, and how you can benefit from itUnderstand....
Release Date 2013/03 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Designing Trustworthy Organizations
Author Robert F. Hurley , Nicole Gillespie , Donald L. Ferrin , Graham Dietz
In the aftermath of the well-publicized frauds of Enron, WorldCom and Tyco circa 2001 and 2002, there were major efforts in the United States to restore trust and enforce corporate compliance. Among other things, the U.S. Congress passed the Sarbanes-Oxley Act ....
Release Date 2013/07 -
Computer Forensics InfoSec Pro Guide
Author David Cowen
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Infor....
Release Date 2013/03