-
Author Mark Burnett
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code d....
Release Date 2004/05 -
Control Systems Engineering, 3rd Edition
Author S. K. Bhattacharya
The book has been designed to cover the complete syllabi of Control Systems taught during various engineering courses at the undergraduate level. It would also help students appearing for competitive examinations like GATE, IAS, IES, NTPC and NHPC. The topics are ex....
Release Date 2013/05 -
Information Theory, Coding and Cryptography
Author Mandal , Nilotpal Manna , Arijit Saha
Information Theory, Coding & Cryptography has been designed as a comprehensive text for the students of engineering discussing Source Encoding, Error Control Codes & Cryptography. The book contains the recent developments of coded modulation, trellises for ....
Release Date 2013/05 -
Author Alyssa Miller
Kickstart a career in cybersecurity by adapting your existing technical and non-technical skills. Author Alyssa Miller has spent fifteen years in cybersecurity leadership and talent development, and shares her unique perspective in this revealing industry guide. In Cybersecurity Career Guide you....
Release Date 2022/06 -
Author Gregory J. Skulmoski
The demand for cybersecurity expertise is growing phenomenally; enhancing cybersecurity project skills will boost technology professionals’ careers and improve organizational cybersecurity readiness.Shields Up: Cybersecurity Project Management provides an end-to-end framework tuned for cybersecurity....
Release Date 2022/08 -
Author Jean Nestor M. Dahj
Develop the analytical skills to effectively safeguard your organization by enhancing defense mechanisms, and become a proficient threat intelligence analyst to help strategic teams in making informed decisionsKey FeaturesBuild the analytics skills and practices you need for analyzing, detecting, an....
Release Date 2022/04 -
Digital Earth - Cyber threats, privacy and ethics in an age of paranoia
Author Sarah Katz
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Release Date 2022/04 -
The Cybersecurity Playbook for Modern Enterprises
Author Jeremy Wittkop
Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniquesKey FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishi....
Release Date 2022/03 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
Executive's Guide to Cyber Risk
Author Siegfried Moyo
A solid, non-technical foundation to help executives and board members understand cyber riskIn the Executive's Guide to Cyber Risk: Securing the Future Today, distinguished information security and data privacy expert Siegfried Moyo delivers an incisive and foundational guidance for executives task....
Release Date 2022/08 -
Author Rida Khatoun
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to i....
Release Date 2022/08 -
Penetration Testing Services Procurement Guide
Author CREST
Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful over....
Release Date 2014/05 -
Get Clients Now! (TM), 3rd Edition
Author Jay Conrad Levinson , C.J. Hayden
Get Clients Now! has helped thousands of independent professionals dramatically increase their client base. With this uniquely practical guide, it’s easy to replace scattershot marketing and networking efforts with proven and targeted tactics. Using a sim....
Release Date 2013/05 -
Author Cynthia Brumfield , Brian Haugli
Cybersecurity Risk ManagementIn Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran technology analyst Cynthia Brumfield, with contributions from cybersecurity expert Brian Haugli, delivers a straightforward and up-to-date exploration of the fund....
Release Date 2021/12 -
End-to-End Adaptive Congestion Control in TCP/IP Networks
Author George A. Rovithakis , Christos N. Houmkozlis
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extens....
Release Date 2017/12 -
Running IT Like a Business: A Step-by-Step Guide to Accenture's Internal IT
Author Robert E. Kress
Uncover the secrets of an award-winning IT function and apply them to your business!Global management, technology and outsourcing company Accenture has achieved incredible results through the transformation of its IT function. It has doubled its revenues in ten year....
Release Date 2011/10 -
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark Wilcox
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11 -
Author Perry Carpenter , Kai Roer
Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior, and culture.The topic of security culture is mysterious and confusing to most leaders. But it doesn’t have to be. In The Security Culture Play....
Release Date 2022/04 -
SCSP SNIA Certified Storage Professional All-in-One Exam Guide (Exam S10-110)
Author Eric Vanderburg
This effective self-study guide offers 100% coverage of the challenging SCSP SNIA Certified Storage Professional examGet complete coverage of all the SCSP exam objectives inside this comprehensive resource. Written by Eric Vanderburg, a leading expert on storage cer....
Release Date 2017/03 -
Cost Management and Control in Government
Author Dale Geiger
Government organizations spend enormous amounts of money. They employ a large percentage of the work force. They have an undeniably huge impact on the national economy and wealth. Yet they are, for the most part, unmanaged. What passes for management is a combinat....
Release Date 2011/06 -
Author Stefano Fornari
Sync your email and other data with mobile devices using Funambol 7.1 About This BookProvide push email capabilities and synchronization services for mobile devices and PC software using Funambol Develop your own Funambol extensions Many examples explaining all fun....
Release Date 2009/12 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
CBAP®/CCBA™ Certified Business Analysis, Study Guide
Author Terri Wagner , Susan Weese
A must-have resource for anyone preparing for the version 2.0 of the CBAP examAs organizations look to streamline their production models, the need for qualified and certified business analysts is growing. The Certified Business Analyst Professional (CBAP) certifica....
Release Date 2011/05 -
Author Richard Swedberg
A practical guide to the art of theorizing in the social sciencesIn the social sciences today, students are taught theory by reading and analyzing the works of Karl Marx, Max Weber, and other foundational figures of the discipline. What they rarely learn, however, ....
Release Date 2014/08 -
Author Jeff Bollinger , Brandon Enright , Matthew Valites
This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy,....
Release Date 2015/05 -
Professional Penetration Testing
Author Thomas Wilhelm
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability iden....
Release Date 2015/08 -
Metasploit Penetration Testing Cookbook - Second Edition
Author Abhinav Singh , Monika Agarwal
Know how hackers behave to stop them! This cookbook provides many recipes for penetration testing using Metasploit and virtual machines. From basics to advanced techniques, it’s ideal for Metaspoilt veterans and newcomers alike.Special focus on the latest operating ....
Release Date 2013/10 -
Corrosion Control for Offshore Structures
Author Ramesh Singh
A variable game changer for those companies operating in hostile, corrosive marine environments, Corrosion Control for Offshore Structures provides critical corrosion control tips and techniques that will prolong structural life while saving millions in cost. In thi....
Release Date 2014/08 -
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
Local Governance and Poverty in Developing Nations
Author Isa Baud , Nicky Pouw
This volume examines the persistence of poverty - both rural and urban - in developing countries, and the response of local governments to the problem, exploring the roles of governments, NGOs, and CSOs in national and sub-national agenda-setting, policy-making, and....
Release Date 2013/06