-
Author Denny Cherry
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make r....
Release Date 2022/09 -
Author Todd Wade
With a focus on cyber fraud and cyber extortion, this book explores cybercrime from attack methods to impact, with the use of real-world case studies alongside practical suggestions on preventative measures, warning signs of cybercrime and next steps if you find yourself a victim.
Release Date 2022/06 -
Learning Nessus for Penetration Testing
Author Himanshu Kumar
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessmentIn DetailIT security is a vast and exciting domain, with vulnerability assessment and penet....
Release Date 2014/01 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
Enhancing Learning and Teaching Through Student Feedback in Social Sciences
Author Patricie Mertova , Chenicheri Sid Nair
This title is the second Chandos Learning and Teaching Series book that explores themes surrounding enhancing learning and teaching through student feedback. It expands on topics covered in the previous publication, and focuses on social science disciplines. The edi....
Release Date 2013/02 -
Nmap 6: Network Exploration and Security Auditing Cookbook
Author Paulino Calderon Pale
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth.Master the power of Nmap 6Learn how the Nmap S....
Release Date 2012/11 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Author Ashok Mohanty , Jibitesh Mishra
Software Engineering covers both function oriented as well as object oriented (OO) approach and emphasises on emerging areas such as 'web engineering', 'software maintenance' and 'component based software engineering'. This book further includes case studies o....
Release Date 2011/07 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
Force.com: Create and Run any Application, On Demand
Author Salesforce.com
Software as a Service (SaaS), also known as on-demand computing, is changing the landscape of information technology in a profound way. By replacing locally managed stacks of networking, hardware, and software resources with an Internet-based utility, this model has....
Release Date 2007/11 -
Mike Meyers's CompTIA Security+ Certification Passport, Fourth Edition (Exam SY0-401)
Author T. J. Samuelle , Dawn Dunkerley
From the #1 Name in Professional CertificationPrepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional—a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.Get o....
Release Date 2014/06 -
Author Richard Enbody , Aditya Sood
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and....
Release Date 2014/04 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
Business and Competitive Analysis: Effective Application of New and Classic Methods
Author Babette E. Bensoussan , Craig S. Fleisher
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.” --Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and bu....
Release Date 2007/02 -
Performing Information Governance: A Step-by-Step Guide to Making Information Governance Work
Author Anthony David Giordano
Make Information GovernanceWork: Best Practices, Step-by-Step Tasks, and Detailed DeliverablesMost enterprises recognize the crucial importance of effective information governance. However, few are satisfied with the value of their efforts to date. Information gover....
Release Date 2014/09 -
Author Lloyd Kaufman
Film is a visual medium, the work of Eric Rohmer and Kevin Smith notwithstanding. It is important for a director and cinemtographer to use their VISUAL EYES in order to VISUALIZE how to make their movie most effective. Also, there is the messy business of actors. ....
Release Date 2013/04 -
Author Neal Allen
Network Maintenance and Troubleshooting GuideField-Tested Solutions for Everyday Problems, Second EditionNeal AllenThe 100% practical, real-world guide to anticipating, finding, and solving network problems—fast!Real-life networks don’t always behave “by the book.” ....
Release Date 2009/10 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05 -
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises, 4th Edition
Author Patrick Y. C. Hwang , Robert Grover Brown
The Fourth Edition to the Introduction of Random Signals and Applied Kalman Filtering is updated to cover innovations in the Kalman filter algorithm and the proliferation of Kalman filtering applications from the past decade. The text updates both the research advan....
Release Date 2012/02 -
Author Sunil Wadhwa , Joe Kelly , Ken Draper , David Delcourt , Vik Davar , Stefan Brunner
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutio....
Release Date 2008/02 -
EnCE EnCase Computer Forensics: The Official EnCase Certified Examiner Study Guide, 3rd Edition
Author Steve Bunting
The official, Guidance Software-approved book on the newest EnCE exam!The EnCE exam tests that computer forensic analysts and examiners have thoroughly mastered computer investigation methodologies, as well as the use of Guidance Software's EnCase Forensic 7. The o....
Release Date 2012/09 -
Author Alan Ferguson
Programme management is the coordinated organisation and implementation of a portfolio of projects and activities that help your business achieve its strategic objectives. Good programme management is the key to managing transformational change and, in today's busi....
Release Date 2014/06 -
Process Systems Engineering for Biofuels Development
A comprehensive overview of current developments and applications in biofuels production Process Systems Engineering for Biofuels Development brings together the latest and most cutting-edge research on the production of biofuels. As the first book specifically devoted to process syst.... -
CompTIA CySA+ Cybersecurity Analyst Certification Passport (Exam CS0-002)
Focused coverage of every topic on the current version of the CompTIA CySA+ examGet on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersecurity professional Bobby Rogers guides you on your career path, providing expert tips and sound advice .... -
The JOBS Act: Crowdfunding for Small Businesses and Startups
Author William Michael Cunningham
On April 5, 2012, President Barack Obama signed the Jumpstart Our Business Startups Act, better known as the JOBS Act. The act is designed to "reopen American capital markets to small companies," defined in the act as Emerging Growth Companies. This is one of the mo....
Release Date 2012/09 -
The Manager’s Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
Author Ron Lepofsky
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnera....
Release Date 2014/12 -
Protective Security: Creating Military-Grade Defenses for Your Digital Business
This book shows you how military counter-intelligence principles and objectives are applied. It provides you with valuable advice and guidance to help your business understand threat vectors and the measures needed to reduce the risks and impacts to your organization. You will know how business-crit.... -
Key Case Law Rules for Government Contract Formation
Author Patrick Butler
Go Beyond the FAR!The guidance contained in the almost 2000 pages of the Federal Acquisition Regulation and the various agency supplements are just a part of the resources government acquisition professionals need to do their jobs effectively. Accessing and un....
Release Date 2014/09 -
Author Tobias Klein
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."–Felix 'FX' LindnerA Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world....
Release Date 2011/11