Skip to main content

Books in Social sciences and humanities

1781-1790 of 14733 results in All results

Cyber Security Awareness for CEOs and Management

  • 1st Edition
  • December 9, 2015
  • Henry Dalziel + 1 more
  • English
Cyber Security for CEOs and Managment  is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.

Essential Skills for Hackers

  • 1st Edition
  • December 9, 2015
  • Kevin Cardwell + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 1 1 1 - 5
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Cyber Security Awareness for Lawyers

  • 1st Edition
  • December 9, 2015
  • Henry Dalziel + 1 more
  • English
Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.

Cyber Security Awareness for Accountants and CPAs

  • 1st Edition
  • December 9, 2015
  • Henry Dalziel + 1 more
  • English
Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.

CISSP Study Guide

  • 3rd Edition
  • December 8, 2015
  • Joshua Feldman + 2 more
  • English
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more joining their ranks, this new third edition presents everything a reader needs to know on the newest version of the exam's Common Body of Knowledge. The eight domains are covered completely and as concisely as possible, allowing users to ace the exam. Each domain has its own chapter that includes a specially-designed pedagogy to help users pass the exam, including clearly-stated exam objectives, unique terms and definitions, exam warnings, "learning by example" modules, hands-on exercises, and chapter ending questions.

Children Learn by Observing and Contributing to Family and Community Endeavors: A Cultural Paradigm

  • 1st Edition
  • Volume 49
  • December 8, 2015
  • Maricela Correa-Chávez + 2 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 1 2 1 - 6
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 1 2 2 - 3
Children Learn by Observing and Contributing to Family and Community Endeavors, the latest in the Advances in Child Development and Behavior Series provides a major step forward in highlighting patterns and variability in the normative development of the everyday lives of children, expanding beyond the usual research populations that have extensive Western schooling in common. The book documents the organization of children’s learning and social lives, especially among children whose families have historical roots in the Americas (North, Central, and South), where children traditionally are included and contribute to the activities of their families and communities, and where Western schooling is a recent foreign influence. The findings and theoretical arguments highlight a coherent picture of the importance of the development of children’s participation in ongoing activity as presented by authors with extensive experience living and working in such communities.

Cyber Security Awareness for Corporate Directors and Board Members

  • 1st Edition
  • December 8, 2015
  • Henry Dalziel + 1 more
  • English
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.  

FORWARD to Professorship in STEM

  • 1st Edition
  • December 7, 2015
  • Rachelle S. Heller + 2 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 0 8 5 5 - 3
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 1 1 2 8 - 7
FORWARD to Professorship in STEM: Inclusive Faculty Development Strategies That Work provides best practices on how to design and implement inclusive workshops aimed at supporting faculty and staff in their career development. The book addresses fundamental skills and strategies to excel in academia, with a focus on assisting women and other underrepresented groups to succeed in obtaining tenure-track faculty positions, and in acquiring tenure. Contributors from wide geographical, disciplinary, and career backgrounds offer their insights on challenges in academia, lessons learned, successes, and outcomes, with chapters devoted to tenure and beyond, collaborations and funding, impact on, and of, the deaf culture, and engaging differences.

Security Controls Evaluation, Testing, and Assessment Handbook

  • 1st Edition
  • December 7, 2015
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 2 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 6 4 - 2
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.

Security Controls Evaluation, Testing, and Assessment Handbook

  • 1st Edition
  • December 7, 2015
  • Leighton Johnson
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 3 2 4 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 6 4 - 2
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.