-
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11 -
Author Josh Pauli
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system....
Release Date 2013/06 -
Author Will Gragido , Iain Davison , David DeSanto , John Pirc
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting....
Release Date 2016/05 -
Author Jayson E Street
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the worl....
Release Date 2015/07 -
Sarbanes-Oxley Ongoing Compliance Guide: Key Processes and Summary Checklists
Author Anne M. Marchetti
Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial ....
Release Date 2007/03 -
Author Martin Nystrom , Chris Fry
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to mon....
Release Date 2009/02 -
EnCE EnCase Computer Forensics: The Official EnCase Certified Examiner Study Guide, 3rd Edition
Author Steve Bunting
The official, Guidance Software-approved book on the newest EnCE exam!The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The o....
Release Date 2012/09 -
Supervision and Safety of Complex Systems
Author Jean Arlat , Yves Vandenboomgaerde , Nada Matta
This book presents results of projects carried out by both scientific and industry researchers into the techniques to help in maintenance, control, supervision and security of systems, taking into account the technical environmental and human factors.This work is su....
Release Date 2012/10 -
The Antivirus Hacker's Handbook
Author Elias Bachaalany , Joxean Koret
Hack your antivirus software to stamp out future vulnerabilitiesThe Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future ....
Release Date 2015/09 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice .... -
Author Karen Pearlman
There are many books on the technical aspects of film and video editing. Much rarer are books on how editors think and make creative decisions.Filled with timeless principles and thought-provoking examples from a variety of international films, the second edition o....
Release Date 2015/12 -
Author Brian O'Leary , Hugh McGuire
The rapid shakeup--from print to digital buying and reading--is a transitional phase, necessary in order to make the next jump, which is far bigger and more exciting: what happens when all books are truly digital, connected, ubiquitous. We're starting to have the i....
Release Date 2012/08 -
Applying Social Tools to Learning
Author Dave Wilkins
With social learning, the whole company is part of the learning and development team. This Infoline will show you how to strategically design effective and agile social learning strategies that address the unique needs of various learning initiatives. Learn about th....
Release Date 2012/04 -
Securing the Borderless Network: Security for the Web 2.0 World
Author Tom Gillis
Securing the Borderless Network: Security for the Web 2.0 WorldTom GillisSecuring the Borderless Network reveals New techniques for securing advanced Web 2.0, virtualization, mobility, and collaborative applicationsToday’s new Web 2.0, virtualization, mobility, tele....
Release Date 2010/04 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Author Cameron Buchanan
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali LinuxIn DetailAs attackers develop more effective and complex ways to compromise computerized systems, penetration testing skills and tools ar....
Release Date 2014/07 -
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in p.... -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
Complex Systems and Systems of Systems Engineering
Author Jean-Luc Wippler , Jean-René Ruault , Dominique Luzeaux
With the growing maturity of information and communication technologies, systems have been interconnected within growing networks, yielding new services through a combination of the system functionalities. This leads to an increasing complexity that has to be manage....
Release Date 2011/10 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
Author Park Foreman
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infras....
Release Date 2009/08 -
Digital Painting, 37 Intermediate Tricks and Techniques
Author Gary Tonge
"Make the most of your digital artwork. State-of-the-art advice from Gary Tonge, one of the world’s leading digital art pros, covers every aspect of computer-generated art—from combining a range of source material into one cohesive image to adding super realistic ef....
Release Date 2011/11 -
The Little Book of HTML/CSS Coding Guidelines
Author Jens Oliver Meiert
A proper plan can improve your code, including your HTML documents and CSS style sheets. Jens Oliver Meiert explores the theory and practice of coding guidelines and shows, using Google’s HTML and CSS standards as a particular example, how consistency and care can ....
Release Date 2015/12