-
Computer Incident Response and Product Security
Author Damir Rajnović
Learn how to build a Security Incident Response team with guidance from a leading SIRT from CiscoGain insight into the best practices of one of the foremost incident response teamsMaster your plan for building a SIRT (Security Incidence Response Team) with detailed ....
Release Date 2010/12 -
How to Use Questions to Maintain Direction and Control of the Agenda
Author Terry J. Fadem
This Element is an excerpt from The Art of Asking: Ask Better Questions, Get Better Answers (9780137144242) by Terry J. Fadem. Available in print and digital formats.Learn questioning techniques that help you control the agenda, overcome challenges, and move forward....
Release Date 2010/03 -
Where Does Social Security Fit Into Your Retirement?
Author Paul B. Brown , Frank Armstrong
This Element is an excerpt from Save Your Retirement: What to Do If You Haven’t Saved Enough or If Your Investments Were Devastated by the Market Meltdown (9780137029006) by Frank Armstrong, III and Paul B. Brown. Available in print and digital formats.A clear-eyed ....
Release Date 2010/09 -
Getting Your Retirement Act Right
Author Trent Hamm
This Element is an excerpt from The Simple Dollar: How One Man Wiped Out His Debts and Achieved the Life of His Dreams (9780137054251) by Trent Hamm. Available in print and digital formats.Retirement: how to start imagining and planning your exciting “next act”!Reti....
Release Date 2010/07 -
Network Forensics: Tracking Hackers through Cyberspace
Author Jonathan Ham , Sherri Davidoff
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadm....
Release Date 2012/06 -
CCNP Security Firewall 642-617 Quick Reference
Author Andrew Mason
As a final exam preparation tool, the CCNP Security Firewall 642-617 Quick Reference provides a concise review of all objectives on the new CCNP Security Firewall exam (642-617). This eBook provides you with detailed, graphical-based information, highlighting only t....
Release Date 2011/01 -
Author Tony Crescenzi
During the Great Depression, legendary British economist Keynes advocated using government money to fill the economic void until consumer spending and business investment recovered. But what happens when governments can't do that anymore? You've arrived at "The Ke....
Release Date 2011/10 -
Author Tony Crescenzi
What happens now? Economics in an age when fiscal stimulus can’t be funded and no longer works.After Lehman fell, the scope of the financial crisis became so great that only the fiscal and monetary authorities possessed balance sheets large enough to resolve it. But....
Release Date 2010/10 -
The Droid Pocket Guide: Ginormous knowledge, pocket-sized, Second Edition
Author Jason D. O’Grady
Here is your essential companion to the Android-powered Droid smartphone. The Droid Pocket Guide, Second Edition, steers you through how to:Set up and quickly start using your Droid smartphone.Make and receive calls and text messages.Send email and synchronize your ....
Release Date 2011/03 -
The Truth About Computer Scams
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.What you must know about Internet scams: from phishing and Trojan horses to fake death threats!After installed on your computer, T....
Release Date 2010/11 -
Author Steve Weisman
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available in print and digital formats.Don’t be the easiest victim! Simple, practical ways to significantly reduce the chances that you’ll be scammed.There are things th....
Release Date 2010/11 -
A Practical Guide to Computer Forensics Investigations
Author Darren R. Hayes
All you need to know to succeed in digital forensics: technicalandinvestigative skills, in one bookComplete, practical, and up-to-dateThoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networksAddresses online and lab investigations, documen....
Release Date 2014/12 -
The Duties and Liabilities of the Board of Directors
Author Brian Tayan , David Larcker
This Element is an excerpt from Corporate Governance Matters: A Closer Look at Organizational Choices and Their Consequences (9780132180269) by David Larcker and Brian Tayan. Available in print and digital formats.A primer on what corporate board members should be d....
Release Date 2011/04 -
Computer Security Fundamentals, Second Edition
Author William Easttom
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing....
Release Date 2011/12 -
From Oz to Kansas: Almost Every Black and White Conversion Technique Known to Man
Author Vincent Versace
The ability to create a stunning black and white image remains one of photography’s greatest and most aspirational skills. Being able to "see" in black and white is an enviable capability, and a well-crafted black and white photograph remains the finest of the fine ....
Release Date 2012/08 -
Digital Archaeology: The Art and Science of Digital Forensics
Author Michael W. Graves
The Definitive, Up-to-Date Guide to Digital ForensicsThe rapid proliferation of cyber crime is increasing the demand for digital forensics experts in both law enforcement and in the private sector. In Digital Archaeology, expert practitioner Michael Graves has writt....
Release Date 2013/08 -
The CERT® Oracle® Secure Coding Standard for Java™
Author David Svoboda , Dean F. Sutherland , Robert C. Seacord , Dhruv Mohindra , Fred Long
“In the Java world, security is not viewed as an add-on a feature. It is a pervasive way of thinking. Those who forget to think in a secure mindset end up in trouble. But just because the facilities are there doesn’t mean that security is assured automatically. A....
Release Date 2011/09 -
Exposure and Understanding the Histogram
Author Andrew Gibson
What does a histogram tell you about contrast, dynamic range, underexposure, and overexposure? Why does exposure differ for digital photography versus film photography? What happens when the exposure is wrong? In this digital short, author Andrew Gibson answers ....
Release Date 2011/07 -
Author Randall F. Trzeciak , Andrew P. Moore , Dawn M. Cappelli
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade sec....
Release Date 2012/01 -
Cisco ASA: All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Author Andrew Ossipov , Omar Santos , Jazib Frahim
Cisco® ASAAll-in-One Next-Generation Firewall, IPS, and VPN Services, Third EditionIdentify, mitigate, and respond to today’s highly-sophisticated network attacks.Today, network attackers are far more sophisticated, relentless, and dangerous. In response, Cisco ASA:....
Release Date 2014/04 -
Secure Coding in C and C++, Second Edition
Author Robert C. Seacord
Learn the Root Causes of Software Vulnerabilities and How to Avoid ThemCommonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a rel....
Release Date 2013/04 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
CISSP Practice Questions Exam Cram, Third Edition
Author Michael Gregg
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.CISSP Practice Questions Exam Cram, Third Edition complements any CISSP study plan with 1,001 practice test questions in the book—all supported by complete explanations of e....
Release Date 2012/09 -
Author Luke Wroblewski
Our industry’s long wait for the complete, strategic guide to mobile web design is finally over. Former Yahoo! design architect and co-creator of Bagcheck Luke Wroblewski knows more about mobile experience than the rest of us, and packs all he knows into this entert....
Release Date 2011/05 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
The Essence of Software Engineering: Applying the SEMAT Kernel
Author Svante Lidman , Ian Spence , Paul E. McMahon , Pan-Wei Ng , Ivar Jacobson
SEMAT (Software Engineering Methods and Theory) is an international initiative designed to identify a common ground, or universal standard, for software engineering. It is supported by some of the most distinguished contributors to the field. Creating a simple langu....
Release Date 2013/01 -
The PayPal Official Insider Guide to Internet Security: Spot scams and protect your online business
Author Michelle Savage
Technology moves fast. So do criminals. Cyber attacks hit large and small merchants alike, phishers and fraudsters seem to be everywhere, and identity theft is prevalent. But this is not the end of the world, and you can’t afford to hide in the closet. Your customer....
Release Date 2012/10 -
Adobe® ColdFusion® Web Application Construction Kit: ColdFusion® 10 Enhancements and Improvements
Author Ben Forta
Adobe ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—used by more ColdFusion developers to learn the product than any other books. ColdFusion 10 was built to make your applications safer, more scalable, and more powerf....
Release Date 2013/04 -
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11