-
Author Russell Dean Vines , CISSP , CISM , Security + , CCNA , MCSE , MCNE , Ronald L. Krutz
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, ....
Release Date 2006/11 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Event-Based Neuromorphic Systems
Author Rodney Douglas , Adrian Whatley , Giacomo Indiveri , Tobi Delbruck , Shih-Chii Liu
Neuromorphic electronic engineering takes its inspiration from the functioning of nervous systems to build more power efficient electronic sensors and processors. Event-based neuromorphic systems are inspired by the brain's efficient data-driven communication desig....
Release Date 2015/02 -
Metamodelling for Software Engineering
Author Brian Henderson-Sellers , Cesar Gonzalez-Perez
This book focuses on metamodelling as a discipline, exploring its foundations, techniques and results. It presents a comprehensive metamodel that covers process, product and quality issues under a common framework.Issues covered include:An explanation of what metamo....
Release Date 2008/10 -
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Author Dominique Paret
Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electron....
Release Date 2007/07 -
CompTIA Security+™: Study Guide, Third Edition
Author Emmett Dulaney , Mike Pastore
Take charge of your career with certification that can increase your marketability. This new edition of the top-selling Guide is what you need to prepare for CompTIA's Security+ SY0-101 exam.Developed to meet the exacting requirements of today's certification cand....
Release Date 2006/05 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition
Author Ross J. Anderson
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better.....
Release Date 2008/04 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Author Marcus Pinto , Dafydd Stuttard
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in ....
Release Date 2007/10 -
The Open Source Alternative: Understanding Risks and Leveraging Opportunities
Author Heather J. Meeker
This book is a user manual for understanding and deployment of open source software licensing in business. Written for lawyers and businesspeople alike, it explains and analyzes open source licensing issues, and gives practical suggestions on how to deal with open s....
Release Date 2008/02 -
CISA® Certified Information Systems Auditor™ Study Guide, Second Edition
Author David L. Cannon
Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS a....
Release Date 2008/03 -
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Author Daniel V. Hoffman
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps ha....
Release Date 2008/04 -
Computer Forensics For Dummies®
Author Reynaldo Anzaldua , Linda Volonino
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving th....
Release Date 2008/10 -
CompTIA Security+™ Deluxe: Study Guide
Author Emmett Dulaney
CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquire....
Release Date 2008/11 -
CompTIA Security+™: Study Guide, Fourth Edition
Author Emmett Dulaney
Revised and updated to include the most up-to-date information, CompTIA Security+ Study Guide, 4th Edition gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and i....
Release Date 2008/11 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05 -
CompTIA Security+™: Review Guide
Author James M. Stewart
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this boo....
Release Date 2008/12 -
Author Michael Gregg , David R. Miller
Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job—as well as step-by-ste....
Release Date 2008/11 -
Systems Engineering Principles and Practice, 2nd Edition
Author Steven M. Biemer , Samuel J. Seymour , William N. Sweet , Alexander Kossiakoff
The Bestselling Guide to the Engineering of Complex Systems, Now Thoroughly UpdatedThe first edition of this unique interdisciplinary guide has become the foundational systems engineering textbook for colleges and universities worldwide. It has helped countless rea....
Release Date 2011/05 -
The CSSLP™ Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
Author Alexander J. Fry , Ronald L. Krutz
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional examThe CSSLP (Certified Secure Software Lifecycle Professional) is a new certification that incorporates government standards and best practices for secure software developm....
Release Date 2009/08 -
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis
Author Marco M. Morana , Tony UcedaVelez
This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security counte....
Release Date 2015/05 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
CEH® Certified Ethical Hacker Study Guide
Author Kimberly Graves
Prepare for the new version of CEH certification with this advanced guideOnce you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it'....
Release Date 2010/04 -
Photographing Yosemite: Digital Field Guide
Author Lewis Kemper
The ideal companion guide for capturing awe-inspiring photos of Yosemite!Whether using a compact camera or a high-end dSLR, this companion guide provides you with detailed information for taking spectacular shots of some of the most recognizable landmarks in the wor....
Release Date 2010/03 -
Introduction to Random Signals and Applied Kalman Filtering with Matlab Exercises, 4th Edition
Author Patrick Y. C. Hwang , Robert Grover Brown
The Fourth Edition to the Introduction of Random Signals and Applied Kalman Filtering is updated to cover innovations in the Kalman filter algorithm and the proliferation of Kalman filtering applications from the past decade. The text updates both the research advan....
Release Date 2012/02 -
The Law of Tax-Exempt Healthcare Organizations, 3rd Edition
Author Bruce R. Hopkins , Thomas K. Hyatt
Authoritative and entirely up to date to reflect recent changes in health law and tax-exempt law, The Law of Tax-Exempt Healthcare Organizations, Cumulative Supplement, Fourth Edition provides a comprehensive, one-volume source of detailed information on federal, st....
Release Date 2011/08 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04