CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Developing Assessment-Capable Visible Learners, Grades K-12: Maximizing Skill, Will, and Thrill


Nancy Frey - 2018
     This illuminating book shows how to make this scenario an everyday reality. With its foundation in principles introduced in the authors' bestselling Visible Learning for Literacy, this resource delves more deeply into the critical component of self-assessment, revealing the most effective types of assessment and how each can motivate students to higher levels of achievement.

Nmap Cookbook: The Fat-free Guide to Network Scanning


Nicholas Marsh - 2010
    Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare


Paul Rosenzweig - 2013
    Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses

Introduction to C Programming


Reema Thareja - 2013
    The aim of the book is to enable students to write effective C programs.The book starts with an introduction to programming in general followed by a detailed introduction to C programming. It then delves into a complete analysis of various constructs of C such as decision control and looping statements, functions, arrays, strings, pointers, structure and union, file management, and preprocessor directives. It also provides a separate chapter on linked list detailing the various kinds of linked lists and how they are used to allocate memory dynamically.A highly detailed pedagogical approach is followed throughout the book, which includes plenty of examples, figures, programming tips, keywords, and end-chapter exercises which make this book an ideal resource for students to master and fine-tune the art of writing C programs.

The Protocols (TCP/IP Illustrated, Volume 1)


W. Richard Stevens - 1993
    In eight chapters, it provides the most thorough coverage of TCP available. It also covers the newest TCP/IP features, including multicasting, path MTU discovery and long fat pipes. The author describes various protocols, including ARP, ICMP and UDP. He utilizes network diagnostic tools to actually show the protocols in action. He also explains how to avoid silly window syndrome (SWS) by using numerous helpful diagrams. This book gives you a broader understanding of concepts like connection establishment, timeout, retransmission and fragmentation. It is ideal for anyone wanting to gain a greater understanding of how the TCP/IP protocols work.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

ITIL Foundation: ITIL 4 Edition


AXELOS Limited - 2019
    It is designed to ensure a flexible, coordinated and integrated system for the effective governance and management of IT-enabled services."ITIL Foundation" is the first ITIL 4 publication and the latest evolution of the most widely-adopted guidance for ITSM. Its audience ranges from IT and business students taking their first steps in service management to seasoned professionals familiar with earlier versions of ITIL and other sources of industry best practice.The guidance provided in this publication can be adopted and adapted for all types of organizations and services. To show how the concepts of ITIL can be practically applied to an organization's activities, ITIL Foundation follows the exploits of a fictional company on its ITIL journey.

The Master Coach: Leading with Character, Building Connections, and Engaging in Extraordinary Conversations


Gregg Thompson - 2017
    Faced with historically low levels of employee engagement (as little as 13% according to Gallup’s latest survey), business leaders see coaching as key to unlocking the human talent, creativity, and innovation that is hiding in plain sight in their workplaces. And rather than bring in external coaches for this purpose, they want to integrate coaching into their company culture—a 2015 study by the International Coaching Federation (ICF) and the Human Capital Institute (HCI) found that 81% of organizations surveyed planned to train managers/leaders in coaching skills.The Master Coach is written for these leaders, and is perfectly positioned to become the definitive book on the topic. Drawing on the wealth of experience that has made Gregg Thompson and Bluepoint Leadership Development the choice of numerous Fortune 100 companies, it illuminates the essence of what it takes to be a great coach. The Master Coach will appeal to leaders at all organization levels, showing them how to make a significant shift in their attitudes, values and behaviors and become more coach-like in all of their daily interactions and conversations.The Master Coach is based on the simple but profound 3Cs Coaching Model. This proven approach asserts that to master the art of coaching one must have an exemplary Character that invites the trust of others, be able to form rapid Connections with others at deeply personal level, and have the ability to initiate and guide intense, attitude-changing Conversations. At every step, Thompson reminds readers that coaching is not merely about what the coach says or does; it is about who he or she is.

Giving Birth


Catherine Taylor - 2002
    This is the perfect companion for parents-to-be and all professionals who are engaged in and witness to the miracle of birth. "One of the most important books on childbirth...A colorful, anecdotal, and research-supported journey from both the mothers' and midwives' perspectives...A classic." (Pam England, nurse-midwife and author of Birthing from Within: An Extra-Ordinary Guide to Childbirth Preparation)

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

The Year in Tech, 2021: The Insights You Need from Harvard Business Review (HBR Insights Series)


Harvard Business Review - 2020
    

Leadership is Hell: How to Manage Well - And Escape with your Soul


Rob Asghar - 2014
    This book punctures that misguided myth—and it will liberate you from others’ expectations and from your own illusions about success. This book is a practical manual for leading the right way and for the right reasons. It explores how to identify and overcome the blind spots that may be hurting your career; whether you have the right mindset for the kind of success that you’re seeking; how to develop just the right amount of “healthy ego” to make an impact; and how to make an impact on the world in a way that’s true to who you are (be forewarned, this might involve a completely different path than your current one). This book will take you on a journey, showing you famous figures from history and the present—some who got it right, and some who didn’t. You’ll look at seven roads to hell within the world of leadership, and seven roads out of hell, to guide you safely to a meaningful legacy. All royalties support the University of Southern California’s Neighborhood Academic Initiative to prepare local urban schoolchildren for college.

WordPress To Go


Sarah McHarry - 2012
    Now a #1 Amazon Best Seller, this step-by-step guide by expert Sarah McHarry will walk you through the essential first steps to creating your own website or blog. In the book's Quick Start Guide, Sarah shows you how to make a website with WordPress in eight easy lessons. In the In-Depth Guide, Sarah introduces you to some of the more advanced techniques to help you develop your WordPress website into a fully functional, professional web presence. What you'll learn in this book:How to get your domain and the right WordPress hostingHow to install WordPress with a few clicks of the mouseHow to design a professional-looking WordPress websiteAdding posts and pagesHow to use graphics and imagesAll about themes, plugins and widgets... and lots more...Important: this guide is up-to-date for the current release of WordPress 3.3.1!Whether you want a simple WordPress blog or a full-blown ecommerce site, Sarah's 'WordPress To Go' will start you off on the right foot.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.