McGraw-Hill Education

The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

Uncertainty and risk, meet planning and action. Reinforce your organization’s security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find …

Learn more

How to Do Everything Microsoft SharePoint 2010

Master Microsoft SharePoint 2010 In How to Do Everything: Microsoft SharePoint 2010, Stephen Cawood–a former member of the SharePoint development team–explains how to get the most out of this powerful business collaboration platform. Learn how to use document management functions, wikis, taxonomy, blogs, My Sites, web parts, and more. Take full advantage of the content management, enterprise …

Learn more

Designing and Managing the Supply Chain 3e with Student CD

Designing and Managing the Supply Chain, 3/e provides state-of-the-art models, concepts, and solution methods that are important for the design, control, operation, and management of supply chain systems. In particular, the authors attempt to convey the intuition behind many key supply chain concepts and to provide simple techniques that can be used to analyze various aspects of …

Learn more

Data Communications and Networking

Data Communications and Networking is designed to help students understand the basics of data communications and networking, and the protocols used in the Internet in particular by using the protocol layering of the Internet and TCP/IP protocol suite. Technologies related to data communication and networking may be the fastest growing in today’s culture. The appearance of …

Learn more

Likeable Social Media, Revised and Expanded: How to Delight Your Customers, Create an Irresistible Brand, and Be Amazing on Facebook, Twitter, LinkedIn, Instagram, Pinterest, and More

The NEW YORK TIMES and USA TODAY bestseller―updated with today’s hottest sites! A friend’s recommendation is more powerful than any advertisement. In the world of Facebook, Twitter, Vine, Instagram, and beyond, that recommendation can travel farther and faster than ever before. Packed with brand-new case studies from today’s emerging social sites, this updated edition of Likeable Social …

Learn more

The Power of Visual Storytelling: How to Use Visuals, Videos, and Social Media to Market Your Brand

Attention is the new commodity. Visual Storytelling is the new currency. Human brain processes visuals 60,000x faster than text. Web posts with visuals drive up to 180% more engagement than those without. Viewers spend 100% more time on web pages with videos. Filled with full-color images and thought-provoking examples from leading companies, The Power of Visual Storytelling explains …

Learn more

IT Auditing Using Controls to Protect Information Assets, 2nd Edition

Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition, explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations, virtualization, and storage are included. This comprehensive guide describes …

Learn more

Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” –Brett …

Learn more

Gray Hat Hacking The Ethical Hacker’s Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker’s Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy …

Learn more