Skip to main content

Books in It management

    • The Basics of Hacking and Penetration Testing

      • 3rd Edition
      • May 1, 2026
      • Thomas Wilhelm + 1 more
      • English
      • Paperback
        9 7 8 0 4 4 3 4 3 8 8 6 8
      • eBook
        9 7 8 0 4 4 3 4 3 8 8 7 5
      The Basics of Hacking and Penetration Testing, Third Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches readers how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clear explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping readers with the know-how required to jump start their careers and gain a better understanding of offensive security. Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. The new Third Edition of this book includes six all-new chapters, and has been completely updated to the most current industry-standard tools, testing methodology and exploitable targets. New chapters on setting up a Pen Testing Lab and Hacking Careers have been added to expand and update the book. This is complemented by videos for use in class. This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
    • Business Process Change

      • 4th Edition
      • February 28, 2019
      • Paul Harmon
      • English
      • Paperback
        9 7 8 0 1 2 8 1 5 8 4 7 0
      • eBook
        9 7 8 0 1 2 8 1 5 8 4 8 7
      Business Process Change: A Business Process Management Guide for Managers and Process Professionals, Fourth Edition, provides a balanced view of the field of business process change. Bestselling author and renowned expert in the field Paul Harmon offers concepts, methods, cases for all aspects, and phases of successful business process improvement. Students and professionals alike will benefit from the comprehensive coverage and customizable, integrated approach to broad business process management that focuses on improving efficiency and productivity. In this updated Edition, particular attention is paid to the impact of disruptive technology on business and the need for agile transformation.
    • RIoT Control

      • 1st Edition
      • September 15, 2016
      • Tyson Macaulay
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 1 2
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 0 3
      RIoT Control: Understanding and Managing Risks and the Internet of Things explains IoT risk in terms of project requirements, business needs, and system designs. Learn how the Internet of Things (IoT) is different from “Regular” Enterprise security, more intricate and more complex to understand and manage. Billions of internet-connected devices make for a chaotic system, prone to unexpected behaviors. Industries considering IoT technologies need guidance on IoT-ready security and risk management practices to ensure key management objectives like Financial and Market success, and Regulatory compliance. Understand the threats and vulnerabilities of the IoT, including endpoints, newly emerged forms of gateway, network connectivity, and cloud-based data centers. Gain insights as to which emerging techniques are best according to your specific IoT system, its risks, and organizational needs. After a thorough introduction to the Iot, Riot Control explores dozens of IoT-specific risk management requirements, examines IoT-specific threats and finally provides risk management recommendations which are intended as applicable to a wide range of use-cases.
    • Green Information Technology

      • 1st Edition
      • March 3, 2015
      • Mohammad Dastbaz + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 3 7 9 3
      • eBook
        9 7 8 0 1 2 8 0 1 6 7 1 8
      We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates that centralized computing infrastructures (data centres) currently use 7 giga watts of electricity during peak loads. This translates into about 61 billion kilowatt hours of electricity used. By the EPA’s estimates, power-hungry data centres consume the annual output of 15 average-sized power plants. One of the top constraints to increasing computing power, besides the ability to cool, is simply delivering enough power to a given physical space. Green Information Technology: A Sustainable Approach offers in a single volume a broad collection of practical techniques and methodologies for designing, building and implementing a green technology strategy in any large enterprise environment, which up until now has been scattered in difficult-to-find scholarly resources. Included here is the latest information on emerging technologies and their environmental impact, how to effectively measure sustainability, discussions on sustainable hardware and software design, as well as how to use big data and cloud computing to drive efficiencies and establish a framework for sustainability in the information technology infrastructure. Written by recognized experts in both academia and industry, Green Information Technology: A Sustainable Approach is a must-have guide for researchers, computer architects, computer engineers and IT professionals with an interest in greater efficiency with less environmental impact.
    • Securing VoIP

      • 1st Edition
      • November 14, 2014
      • Regis J. Jr (Bud) Bates
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 0 3 9 1
      • eBook
        9 7 8 0 1 2 4 1 7 1 2 2 0
      Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
    • PCI Compliance

      • 4th Edition
      • October 29, 2014
      • Branden R. Williams + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 5 7 9 7
      • eBook
        9 7 8 0 1 2 8 0 1 6 5 1 0
      Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifia... information.
    • Windows Performance Analysis Field Guide

      • 1st Edition
      • August 12, 2014
      • Clint Huffman
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 7 0 1 8
      • eBook
        9 7 8 0 1 2 4 1 6 7 0 4 9
      Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems.
    • Campus Strategies for Libraries and Electronic Information

      • 1st Edition
      • June 28, 2014
      • Caroline Arms
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 5 8 0 3
      • eBook
        9 7 8 1 4 8 3 2 9 4 4 8 3
      A look at how ten American colleges and Universities bridged the gap between computing, administrative, and library organisationsDetaile... case studies from ten American colleges and universities will prepare you to make better plans and decisions for an electronic library, integrated information management system, or unified information resource. You'll find models and guidelines covering reference services, latest philosophies and strategies, management and organization issues, delivery mechanisms, and more.
    • Windows Forensic Analysis Toolkit

      • 4th Edition
      • March 11, 2014
      • Harlan Carvey
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 7 2
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 4 9
      Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free custom tools, and walk-through demos. This edition complements Windows Forensic Analysis Toolkit, Second Edition, which focuses primarily on XP, and Windows Forensic Analysis Toolkit, Third Edition, which focuses primarily on Windows 7. This new fourth edition provides expanded coverage of many topics beyond Windows 8 as well, including new cradle-to-grave case examples, USB device analysis, hacking and intrusion cases, and "how would I do this" from Harlan's personal case files and questions he has received from readers. The fourth edition also includes an all-new chapter on reporting.
    • The Basics of IT Audit

      • 1st Edition
      • October 31, 2013
      • Stephen D. Gantz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 9 6
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 6 3
      The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.