Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Microsoft Office 2010: Introductory


Gary B. Shelly - 2010
    Our trademark step-by-step, screen-by-screen approach now encourages users to expand their understanding of the Office 2010 software through experimentation, exploration, and planning ahead.

Breakpoint


Jon McGee - 2015
    Fortunately, Jon McGee is an ideal guide through this dynamic marketplace. In Breakpoint, he argues that higher education is in the midst of an extraordinary moment of demographic, economic, and cultural transition that has significant implications for how colleges understand their mission, their market, and their management. Drawing from an extensive assessment of demographic and economic trends, McGee presents a broad and integrative picture of these changes while stressing the importance of decisive campus leadership. He describes the key forces that influence higher education and provides a framework from which trustees, presidents, administrators, faculty, and policy makers can address pressing issues in the aftermath of the Great Recession.Although McGee avoids endorsing one-size-fits-all solutions, he suggests a number of concrete strategies for handling prospective students and developing pedagogical practices, curricular content and delivery, and management structures. Practical and compelling, Breakpoint will help higher education leaders make choices that advance their institutional values and serve their students and the common good for generations to come.

The Naked Roommate: For Parents Only: A Parent's Guide to the New College Experience: Calling, Not Calling, Packing, Preparing, Problems, Roommates, ... Matters when Your Child Goes to College


Harlan Cohen - 2012
    Using Cohen's trademark style-with tips, statistics, quotes, and stories from parents and students, as well as expert advice-this guide tackles the most important topics on parents''minds, including:• What parents should never say or do when dropping their child off on campus• Staying connected (but not too connected) to your child• When to visit, how often to visit, what to expect when visiting• Helping your child make good choices & supporting the wrong ones• What every parent must know about safety issues

Essential Environment: The Science Behind the Stories


Jay Withgott - 2011
    Jay Withgott and new co-author Matt Laposata present the latest coverage of environmental science and introduce new FAQ sections to address common student misconceptions. Note: This is the standalone book if you want the book/access card order the ISBN below: 0321752546 / 9780321752543 Essential Environment: The Science behind the Stories Plus MasteringEnvironmentalScience with eText -- Access Card Package Package consists of: 0321752902 / 9780321752901 Essential Environment: The Science behind the Stories 0321754077 / 9780321754073 MasteringEnvironmentalScience with Pearson eText -- Valuepack Access Card -- Essential Environment: The Science behind the Stories (ME component) "

Business Data Communications and Networking


Jerry FitzGerald - 1995
    Updated with the latest advances in the field, Jerry FitzGerald and Alan Dennis' 10th Edition of Business Data Communications and Networking continues to provide the fundamental concepts and cutting-edge coverage applications that students need to succeed in this fast-moving field.Authors FitzGerald and Dennis have developed a foundation and balanced presentation from which new technologies and applications can be easily understood, evaluated, and compared.

Staffing Organizations


Herbert G. Heneman III - 1994
    This work contains components of the model, which include staffing models and strategy, staffing support systems (legal compliance, planning, job analysis and rewards), core staffing systems (recruitment, selection, employment), and staffing system and retention management.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

The Inclusive Classroom: Strategies for Effective Instruction


Margo A. Mastropieri - 1999
    The Inclusive Classroom: Strategies for Effective Instruction provides a wealth of practical and proven strategies for successfully including students with disabilities in general education classrooms. The text is unique for its three-part coverage of fundamentals of teaching students with special needs (including legal and professional issues, and characteristics of students with special needs); effective general teaching practices (including such topics as strategies for behavior management, improving motivation, increasing attention and memory, and improving study skills); and inclusive practices in specific subject areas (including literacy, math, science and social studies, vocational and other areas). This approach allows readers to understand students with special learning needs, effective general practices for inclusive instruction, and content-specific strategies. The overall approach is one of effective instruction, those practices that are most closely aligned with academic success.

CompTIA Project+ Study Guide Authorized Courseware: Exam PK0–003


Kim Heldman - 2010
    You'll find complete coverage of all exam objectives, including key topics such as project planning, execution, delivery, closure, and others. CompTIA's Project+ is the foundation-level professional exam in the complex world of project management; certified project managers often choose to go on and obtain their Project Management Professional (PMP) certifications as well Provides complete coverage of all exam objectives for CompTIA's first update to the Project+ exam in six years Covers project planning, execution, delivery, change, control, communication, and closure Demonstrates and reinforces exam preparation with practical examples and real-word scenarios Includes a CD with Sybex test engine, practice exams, electronic flashcards, and a PDF of the book Approach the new Project+ exam with confidence with this in-depth study guide! Reviews

Security Pillar: AWS Well-Architected Framework (AWS Whitepaper)


AWS Whitepapers - 2016
    It provides guidance to help customers apply best practices in the design, delivery, and maintenance of secure AWS environments. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

The Wilding of America: Money, Mayhem, and the New American Dream


Charles Derber - 1996
    The American Dream champions individualism.  But at what price?  In this timely revision of The Wilding of America, Charles Derber chronicles the latest incidents of "wilding" - extreme acts of self-interested violence and greed - that signal an eroding of the moral landscape of American society.  Despite this ever-increasing emphasis on individualism in America, Derber offers a communitarian alternative that is as inspiring as it is instructive.

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.