Violence at Sea is an overview of maritime piracy, examining threats that piracy poses to global security and commerce, as well as measures and policies to mitigate the threat. The essays analyze piracy activities in key shipping lanes (including the African coast, the Arabian Sea, the Bay of Bengal, and the Straits of Malacca-South China...
Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...
Master the tactics and tools of the advanced persistent threat hacker
In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...
A straightforward guide to trading today's dynamic Forex market
Written by Wayne McDonell, the Chief Currency Coach at FX Bootcamp, this book shows readers how to successfully trade the Forex market on their own. FX Bootcamp's Guide to Strategic and Tactical Forex Trading skillfully explains how to combine...
In the present era of the post "new economy," scores of successful companies are now tending more than ever to steer away from the old model of extreme reward by extreme speculation. While innovation thrives today, it is focused on the fundamentals of value and high performance. Technology blueprints are concrete, proven tactical and...
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first...
Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...
Ossifi cation of the posterior longitudinal ligament (OPLL) is no longer only a Japanese
disease. In 2004, 18 papers on OPLL and related conditions were published, and 7 of
those were from countries other than Japan. Major textbooks on spine surgery, such
as The Spine, The Cervical Spine, and Spine Surgery, have devoted chapters to...
The CRMOD software is built to world-class industry reference models of customer relationship management, and the service provides all the software and features you would need for a world-class customer relationship management practice. This knowledge is essential to keep the costs of investment low and return on the investment high.
What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...