CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Principles of Risk Management and Insurance


George E. Rejda - 1994
    This edition provides updated coverage of events such as the September 11th terrorist attacks and their effect on insurance, the Economic Growth and Tax Relief Reconciliation Act of 2001 and the President's Commission on Social Security.

Adobe Photoshop Cs2 Classroom in a Book


Adobe Creative Team - 2005
    There's a solution: With this book, you learn by doing, getting your feet wet immediately as you progress through a series of hands-on projects that build on your growing Photoshop knowledge. Simple step-by-step instructions, review questions at the end of each chapter, and a companion CD with all of the book's project files make learning a breeze as the Adobe Creative Team takes you on a self-paced tour of the image-editing powerhouse. This bestselling guide has been completely revised to cover all of Photoshop CS2's new features, which include advanced tools for digital photographers, such as a new Spot Healing Brush for correcting scratches or blemishes, and Smart Sharpen for fixing photo blurring. Photoshop CS2 also includes loads of new creative tools, such as Vanishing Point and Image Warp. This comprehensive guide starts with an introductory tour of the software and then progresses on through lessons on everything from Photoshop's interface to more complex topics like color management, Web graphics, and photo retouching."

Excel 2007 VBA Programming for Dummies


John Walkenbach - 1996
    Packed with plenty of sample programs, it explains how to work with range objects, control program flow, develop custom dialog boxes, create custom toolbars and menus, and much more.Discover how toGrasp essential programming concepts Use the Visual Basic Editor Navigate the new Excel user interface Communicate with your users Deal with errors and bugs

Visual C++ Programming


Yashavant P. Kanetkar - 2004
    

OS X Lion: the Ars Review


John Siracusa - 2011
    

Process Control Instrumentation Technology


Curtis D. Johnson - 1900
    It also presents some of the practical details of how elements of a control system are designed and operated, such as would be gained from on-the-job experience. This middle ground of knowledge enables users to design the elements of a control system from a practical, working perspective, and comprehend how these elements affect overall system operation and tuning. KEY TOPICS: This edition includes treatment of modern fieldbus approaches to networked and distributed control systems. Generally, this guidebook provides an introduction to process control, and covers analog and digital signal conditioning, thermal, mechanical and optical sensors, final control, discrete-state process control, controller principles, analog controllers, digital control and control loop characteristics. MARKET: For those working in measurement and instrumentation and with control systems and PLCs.

Integrating Educational Technology Into Teaching


Margaret D. Roblyer - 1996
    It shows teachers how to create an environment in which technology can effectively enhance learning. It contains a technology integration framework that builds on research and the TIP model.

Data Structures: A Pseudocode Approach with C


Richard F. Gilberg - 1998
    A new four-part organizational structure increases the flexibility of the text, and all material is presented in a straightforward manner accompanied by an array of examples and visual diagrams.

Introduction to Geographic Information Systems [With CDROM]


Kang-Tsung Chang - 2001
    Now in its 12th edition, it is still the market leader and is known for its scientific research base and its currency, comprehensiveness, and accuracy.

Fundamentals of Electrical Engineering


Leonard S. Bobrow - 1995
    The text is divided into four parts: circuits, electronics, digital systems, and electromagnetics. Although it delves in depth into each of these topics, the text represents more than your basic survey of the basics of electrical engineering. A solid understanding of the fundamental principles on which modern electrical engineering is based is also provided. This edition includes a chapter on circuit analysis software SPICE, with a detailed discussion of the PC version known as PSPICE (from MicroSim Corp.). Numerous drill exercises have been added to this new edition, reinforcing ideas presented in the examples. There are over 1,000 end-of-chapter problems. This text is suitable for a variety of electrical engineering courses. It can be used as a text for an introduction to electrical engineering for both majors and non-majors or both, or can be split and the various chapters utilized for an introduction to circuits course, a first electronics course, or for a course on digital electronics and logic design.

Getting Started with Arduino


Massimo Banzi - 2008
    Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

UNIX Concepts and Applications


Sumitabha Das - 2003
    

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.