wiley technology rights guide fbf 13
DESCRIPTION
ÂTRANSCRIPT
FRANKFURT
2013
Technology Rights Guide
2
WILEY US RIGHTS TEAM Professional development and higher education titles
published US, Canada & all For Dummies
Kristin Kliemann VP, Director of Global Rights Tel: +1-201-748-6412 [email protected] Marc Mikulich VP, Brand Management & International Rights Tel: +1-201-748-5605 [email protected] Joseph Grosso Japanese professional development, German, French, Tel: +1-201-748-6683 [email protected] Ashley Mabbitt Dutch, Portuguese, Spanish rights Tel: +1-201-748-7798 [email protected] Nicole Feanny Scandinavian, Polish, Russian, Ukrainian, and Baltic language rights Tel: +1-201-748-8710 [email protected] Jessica Roslin English reprint Eastern European excl. Polish, Middle Eastern, Tel: +1-201-748-7733 [email protected] Natasha De Bernardi Italian rights [email protected]
WILEY UK RIGHTS TEAM Global STM, Professional development and higher
education titles published UK, Singapore & Australia All languages except Asian languages.
Jen Holton Associate Director, Global Rights U.K. Tel: +44-1243-770-542 [email protected] Sue Mattingley Medicine & health sciences Tel: +44 1865 47 6152 [email protected] Julie Attrill Higher education, professional development and physical science Tel: +44-1243-770-646 [email protected] Dale Morgan Social science & humanities and life science Tel: +44-1865-476-153 [email protected]
WILEY ASIA RIGHTS TEAM Titles from all locations, all Asian languages, except
Japanese professional development titles
Kate Song/Elena Luo/Iris Wang Simplified Chinese Tel: +86-10-8418-7815 [email protected] Pauline Pek/Feifan Li/Cheryl Lee Bahasa Indonesian, Japanese, Korean, Orthodox Chinese, Thai, and Vietnamese Tel: +65-6-6438-090
3
Table of Contents
Apple ............................................................................................................................... 4 General Computing & Internet ......................................................................................... 5 Graphic & Multimedia .................................................................................................... 12
Networking .................................................................................................................... 13 Photography .................................................................................................................. 16 Programming ................................................................................................................. 18 Security ......................................................................................................................... 21
4
Apple
Guy Hart-Davis
TEACH YOURSELF VISUALLY MACBOOK AIR
Computer Hardware / Macintosh • 978-1-118-81628-8
Paper • 352 pages • 18.73 x 23.34 cm. • 11/15/2013
Teach Yourself VISUALLY MacBook Air offersa visually appealing approach to step-by-step instruction with full color spreads that bring each step into clear view. From basic steps, such as powering on or shutting down the MacBook Air to working with OS X and Mission Control and Launchpad to downloading applications from the Mac App Store and running Windows applications, Teach Yourself VISUALLY MacBook Air covers all the vital information and provides the help and support a reader needs--in many ways it's like having an Apple Genius at one’s side helping tackle questions that may arise. Teach Yourself VISUALLY MacBook Air will cover new hardware updates, the latest version of Mac OS X, iCloud, FaceTime, and more.
Guy Hart-Davis (Barnard Castle, UK) is the author of more than 40 computing books, including Mac OS X Leopard QuickSteps, How to Do Everything with Your iPod & iTunes, and iMacs Portable Genius. He also writes about PCs, Windows, Linux, and VBA.
Paul McFedries
TEACH YOURSELF VISUALLY COMPLETE MAC PRO
Operating Systems / Macintosh & iOS • 978-1-118-82645-4
Paper • 576 pages • 18.73 x 23.50 cm. • 12/06/2013
The forthcoming Mac Pro is a completely new vision of what a desktop computer can be. And the upgrades and futuristic new features are not just limited to the exterior design. The internal hardware with all-Flash memory, rock solid architecture, and connection ports galore all sit at the bleeding edge of desktop computer technology. Teach Yourself VISUALLY Complete Mac Pro demonstrates essential tasks readers need to know in working with their new Mac Pros, while also offering top tips and advice on getting the most out of the bleeding edge device. This book helps them customize their Mac Pros, make the most of their digital media, interact with common pro level software and discover what's new with the latest OS from Apple, including Game Center, Messages, and Notifications as well as features unique to this industry leading new desktop. Using plentiful, detailed screenshots and illustrations, and straight-forward step-by-step instructions, anyone wanting to know how to get the most from Apple's masterpiece of a computer will benefit from this book.
Paul McFedries (Toronto, Ontario) is the president of Logophilia Limited, a technical writing company. He has been programming since he was a teenager in the mid-1970s, has programmed everything from mainframes to desktops to bar code scanners, and has worked with many different languages, including Fortran, assembly language, C++, and, of course, JavaScript. Paul has written more than three dozen books that have sold more than two million copies worldwide. These books include iPhone 5 Portable Genius and Teach Yourself VISUALLY Mac OS X Mountain Lion. Paul encourages all readers to drop by his Web site, www.mcfedries.com.
5
General Computing & Internet
Bill Schmarzo
BIG DATA: UNDERSTANDING HOW DATA POWERS BIG BUSINESS
Database & Data Warehousing Technologies • 978-1-118-73957-0
Paper • US$ 39.95 • 208 pages • 18.73 x 23.50 cm. • 09/20/2013
This book provides “how to” advice and a series of pragmatic methodologies (with accompanying hands-on exercises) for helping organizations leverage big data analytics to power, or re-wire, their value chains. Organizations struggle identifying where and how to leverage these new structured and unstructured data sources and new big data technology innovations to delivery business value. Consequently, many organizations default to taking a technology-led approach to their big data strategies. Leading companies find ways to leverage data – especially new sources of data – to tease out new insights about their customers, products, operations, competitors and markets. And these organizations leverage these insights to improve their customer experiences, create new, more compelling products and create new sources of competitive differentiation.
Providing pragmatic advice to help organizations identify specific areas of the business where and how big data can power or rewire their value creation processes, the book will cover:
Decomposing your organization’s business strategy in order to link your big data initiatives to your organization’s value creation processes
Review and understand different value creation processes and models
Envisioning exercises
Operationalizing big data including organizational structures, education challenges and new big data-related roles
Bill Schmarzo is the Chief Technical Officer for Enterprise Information Management for EMC. Bill is referred to as the “Dean of Big Data” where he is responsible for setting strategy for EMC’s Big Data consulting business. He has been immersed in the worls of big data for more than 20 years with experience in data warehousing, business intelligence and analytic applications. Previously, Bill was Vice President of Advertiser Analytics at Yahoo. As EMC’s Big Data evangelist, Bill speaks around the world. He created the Business Benefits Analysis methodology that links an organization’s strategic business initiatives with their supporting data and analytic requirements, and co-authored with Ralph Kimball a series of articles on analytic applications. He has also served on The Data Warehouse Institute’s faculty as the head of the analytic applications curriculum.
6
Wayne L. Winston
MARKETING ANALYTICS: DATA-DRIVEN TECHNIQUES WITH MICROSOFT EXCEL
Database & Data Warehousing Technologies • 978-1-118-37343-9
Paper • US$ 49.99 • 648 pages • 18.73 x 23.50 cm. • 11/27/2013
Marketing Analytics: Data-Driven Techniques with Microsoft Excel shows business managers and data analysts how to use a relatively simple tool--Excel--to analyze useful business information using powerful analytic techniques. This comprehensive book shows how to use each technique to solve a practical businenss problem and achieve optimum marketing results.
Wayne L. Winston is the John and Esther Reese chaired Professor of Decision Sciences at the Kelley School of Business at Indiana University. He has also taught data modeling at major organizations such as 3M, Cisco, US Army, Eli Lilly, Deloitte Consulting, and Microsoft. He has won more than 30 teaching awards. The author has written over a dozen books including Data Analysis and Business Modeling with Excel and Data Analysis and Decision Making (with Chris Albright).
Adam Jorgensen, John Welch, Christopher Price, Brian Mitchell, James Rowland-Jones
MICROSOFT BIG DATA SOLUTIONS
Database & Data Warehousing Technologies • 978-1-118-72908-3
Paper • US$ 49.99 • 408 • 18.73 x 23.50 cm. • 01/07/2014
The book will show readers how to get their organization set up for Big Data using Microsoft technologies as well as open source tools. The book will focus on Microsoft's new Big Data platform--HDInsight--showing readers how to use HDInsight to store, manage, analyze, and share Big Data throughout the enterprise. The author will cover both on-premises and cloud-based solutions. The book details best practices for integrating these solutions with technologies they already have and know--including SQL Server and Hadoop. Solutions will be illustrated with case studies from real world implementations. After reading this book, readers will have a detailed road map for designing and implementing a fully deployed Big Data solution
Adam Jorgensen is the President of Pragmatic Works Consulting, a global BI solutions firm that delivers SQL Server, SharePoint and Business Intelligence solutions. Adam is a Director at large for the Professional Association of SQL Server (SQL PASS); and a Microsoft SQL Server MVP.
7
Gradiva Couzin, Jennifer Grappone
FIVE STARS: PUTTING ONLINE REVIEWS TO WORK FOR YOUR BUSINESS
Internet Business • 978-1-118-68944-8
Paper • US$ 29.99 • 264 pages • 18.73 x 23.50 cm. • 01/09/2014
While most businesses know the importance of online reviews on sites such as Yelp.com, they have no clue how to grab the reins and help shape the conversation around their service or product. This detailed, comprehensive guide covers the tools, tactics, and techniques for getting and leveraging reviews to increase sales. Featuring the same conversational, empowering tone that helped make the authors’ SEO: An Hour a Day books best-sellers, Five Stars is a concise yet comprehensive reference for small business owners, marketers, and social media managers that covers everything from getting more and better reviews, using tools to track and monitor reviews on such sites as Yelp.com, how to integrate reviews on their own sites, leverage this content in social media and other channels, and such other crucial topics as handling negative reviews and leveraging mobile’s impact. Featuring detailed commentary, great how-tos and fascinating case studies, this unique book is sure to help today’s savvy marketing practitioners capitalize on this important content marketing practice.
Online marketing consultants Jennifer Grappone and Gradiva Couzin have improved the online presence of a wide variety of companies in entertainment, software, non-profit, and retail for over a decade. They work with clients to develop and implement thoughtful, results-oriented strategies for SEO, social media, and paid search using a holistic approach that combines good writing, compelling content, search-friendly site design and usability, all informed by meaningful metrics. Equally adept with B2B and B2C, the human element and technical details, and local and international targeting, together they deliver a well-rounded, left-brain/right-brain approach to their clients' digital strategies.
Richard Wentk
TEACH YOURSELF VISUALLY RASPBERRY PI
Computer Hardware • 978-1-118-76819-8
Paper • US$ 29.99 • 320 pages • 18.73 x 23.34 cm. • 01/31/2014
The Raspberry Pi is the world’s most popular computer in its price range—$35! The Raspberry Pi is popular with schools and would be computer professionals, technology developers, and researchers as a low-cost system on a board that can be used in countless ways. The Raspberry Pi was initially developed for the education sector with the intent of providing students with a low cost computer that they could study and tinker with. The concept caught on not only with students, but also with aspiring and industrious computer professionals interested in seeing what they could do with a low cost system on a board.
The Raspberry Pi can be easily used as a stand-alone computer, a home theatre media hub, a system server, and much more! Teach Yourself VISUALLY Raspberry Pi brings Raspberry Pi projects to life with vivid full-color images, well-illustrated circuit diagrams, and step-by-step practical advice, covering everything from working with the included software to branching out into typical but more complex endeavors with the $35 Raspberry Pi.
Richard Wentk is a developer with more than fifteen years’ experience in publishing, and is one of the UK's most reliable technology writers. He covers Apple products and developments for MacWorld and MacFormat magazines, and also writes about technology and business strategy for titles such as Computer Arts and Future Music. As a trainer and a professional developer who currently focuses on iOS, he's uniquely placed to explain the development process in a way that emphasizes benefits, avoids pitfalls and bear traps, and clarifies memorable key points.
8
Jimmy John, William Hsu
PROGRAMMER'S BOOTCAMP: IMPROVE YOUR SKILLS, LAND A JOB
Programming & Software Development • 978-1-118-82840-3
Paper • US$ 39.99 • 312 • 18.73 x 23.50 cm. • 02/07/2014
This book teaches best practices for software design and development that can be used in any major programming language. In this book, the authors dissect dozens of different types of coding challenges of all difficulty levels, step by step. (Many of these challenges are derived from challenges the world’s top companies regularly use.) Readers can then go to the interactive website powered by CodeEval to take the challenge and test their skills as they learn.
Jimmy John founded CodeEval, a developer community that to date has created and hosted more than 100,000 coding challenges for its members and clients. Prior to founding CodeEval, he was the lead developer at Splunk (SPLK) and was behind many of Transunion’s payment technologies.
William Hsu is a software developer and the co-founder of CodeEval. Previously he founded Textbo (acquired by Koofers) and worked at TechCrunch and Apple.
Slava Gomzin
HACKING POINT OF SALE: PAYMENT APPLICATION SECRETS, THREATS, AND SOLUTIONS
Networking / Security • 978-1-118-81011-8
Paper • US$ 60.00 • 384 • 18.73 x 23.50 cm. • 02/03/2014
Hacking Point of Sale describes the payment application security as a journey from the failure of the “security through obscurity” approach to the power of real cryptographic solutions. All aspects of card-payment processing, from the structure of magnetic stripes to the architecture and deployment models of payment applications, are reviewed from the viewpoint of security. Although there is an entire chapter about PCI, as well as multiple references to the standards (an essential part of the payment industry), the book is not a trivial guide to PCI compliance but looks beyond PCI and provides practical recommendations on how to implement real application security controls. The book covers:
Anatomy of Electronic Payments: Processing Payment Transactions; Architecture of Payment Applications; Security Standards; Attacks on Point-of-Sale Systems
Turning 40 Digits into Gold: Hacking Protected Areas;Penetrating the Security-Free Zone; Exploiting Other Vulnerabilities
Defense: Cryptography in Payment Applications; Protecting Cardholder Data; Securing Application Code
An Appendix provides a Payment Application Security Evaluation Checklist, a handy tool for merchants, software vendors, and security assessors. The checklist will assist in security risk assessment by evaluating the quality of payment application security controls.
Slava Gomzin is the Security Architect for Retalix (RTLX on Nasdaq and the Tel Aviv Exchange), a provider of software and services to more than 70,000 retailer and distributors with more than 400,000 checkout Lanes across more than 50 nations worldwide – with many of its customers ranking among the top retailers in their respective market domains. Slava holds multiple security certifications: CISSP, ISA, PCIP, ECSP, and Security + and has more than 16 years of professional experience in software development and security including app dev for the retail industry and electronic payments, .NET and SQL server dev, and application security and PCI compliance.
9
Dean Abbott
APPLIED PREDICTIVE ANALYTICS: PRINCIPLES AND TECHNIQUES FOR THE PROFESSIONAL DATA ANALYST
Database & Data Warehousing Technologies • 978-1-118-72796-6
Paper • US$ 50.00 • 456 • 19.05 x 23.50 cm. • 02/12/2014
Predictive Analytics shows tech-savvy business managers and data analysts how to use the techniques of predictive analytics to solve practical business problems. It teaches readers the methods, principles, and techniques for conducting predictive analytics projects, from start to finish. The author focuses on best practices---including tips and tricks---that are essential for successful predictive modeling.
The author explains the theory behind the principles of predictive analytics in plain English; readers don't need an extensive background in math and statistics, which makes it ideal for most tech-savvy business and data analysts.
Each of the techniques chapters will begin with a description of the specific technique and how it relates to the overall process model for predictive analytics. The depth of the description of a technique will match the complexity of the approach; the intent is to describe the techniques in enough depth for a practitioner to understand the effect of the major parameters needed to effectively use the technique and interpret the results. For example, with decision trees, the primary algorithms (C5, CART and CHAID) will be described in qualitative terms (what are trees, what is a split), how they are similar and different (Gini vs. Entropy vs. chi-square tests), why one might use one technique over another, how one can be fooled by the models built using each algorithm (i.e., their weaknesses), what knobs one can adjust (depth, complexity penalties, priors, costs, etc.), and how to interpret the results.
Dean Abbott is President of Abbott Analytics, Inc. (San Diego). He is an internationally recognized data mining and predictive analytics expert with over two decades experience in fraud detection, risk modeling, text mining, personality assessment, planned giving, toxicology,and other applications. He is also Chief Scientist of SmarterRemarketer, a company focusing on behaviorally- and data-driven marketing and web analytics. He is a popular speaker at Predictive Analytics and Data Mining conferences, including Predictive Analytics World, Predictive Analytics Summit, the Predictive Analytics Center of Excellence, and SAS Institute. He is on the Advisory Boards for the UC/Irvine Predictive Analytics Certificate and the UCSD Data Mining Certificate programs.
10
Noel Markham
ACING THE JAVA PROGRAMMING INTERVIEW
Programming & Software Development • 978-1-118-72286-2
Paper • US$ 39.99 • 384 • 18.73 x 23.50 cm. • 03/03/2014
Acing the Java Programming Interview provides more than 150 interview questions and solutions that job seekers are likely to encounter when interviewing for Java coding positions. These real-world questions come from real employer interviews, as compiled by the online interview testing site Interview Zen. The book covers three main skill sets: The Interview Process, Core Java, and Java Components and Frameworks. The Interview Process section prepares readers for the various interview formats that can trip up even an experienced programmer. These include telephone screening, technical at-computer or “pair testing", and the softer personality-based interviews. These are the types of questions used to weed out applicants, before getting into detailed questions that drill down into Java itself. For example, basic questions regarding software design patterns, data formats and algorithms.
Noel Markham is an experienced interviewer and Java developer with experience across technology, financial and gaming industries. Most recently he has been working in startups for social gaming and digital entertainment. He has hosted interviews for all experience levels of developer, from graduates to technical leaders. As well as leading IT graduate recruitment for some universities for his employer, he has run assessment centres in the UK and overseas to set up full development teams. For this title, he will partner with Interview Zen---the online programming interview test site.
11
Wade Alcorn, Christian Frichot, Michele Orru
THE BROWSER HACKER'S HANDBOOK
Networking / Security • 978-1-118-66209-0
Paper • US$ 55.00 • 600 • 18.73 x 23.50 cm. • 03/05/2014
The book demonstrates not only that hackers can target your browser, but how; it shows how hackers can use your browser as a beachhead to launch attacks deep into your network. What was once previously considered a purely theoretical attack technique is now within reach of the reader. This book will demonstrate the techniques of web browser hacking:
Attacking the Browser
Attacking the Web (via the browser)
Attacking the Intranet (via the browser)
Attacking Mobile Devices (via the browser)
Browser Hardening
Wade Alcorn is the Asia Pacific General Manager for NCC Group and was one of the first penetration testers in Australia and is the creator of the BeEF open source browser exploitation framework, among Insecure.org's top 100 security tools. Wade is a founding director of The Council of Registered Ethical Security Testers in Australia and presents at numerous international conferences. Christian Frichot is a founding partner of Asterisk Information Security with a focus on data visualization/data analysis and is one of the developers of BeEF. He is a leader of the Perth Open Web Application Security Project and is a speaker at numerous conferences.
Michele Orrù a.k.a. antisnatchor is a security professional and a frequent speaker at hacking conferences: CONFidence, DeepSec, Hacktivity, SecurityByte, AthCon, HackPra, Semafor, Just4Meeting, OWASP AppSec USA, 44Con, EUSecWest and is a Senior Spider for Trustwave SpiderLabs as well as a guest lecturer at European universities. The lead core developer of the BeEF project, previously he worked for the Royal Bank of Scotland and the National Institute for Nuclear Physics.
12
Graphic & Multimedia
Lisa DaNae Dayley, Brad Dayley
PHOTOSHOP CC BIBLE
Graphics & Design software (Non-Microsoft) • 978-1-118-64369-3
Paper • US$ 49.99 • 1272 • 18.73 x 23.50 cm. • 10/25/2013
The Photoshop CC Bible is the only book you need to succeed in any Photoshop endeavor. It shows readers how to retouch, color correct, manipulate, and combine images using Photoshop CC. Readers will learn to create cutting-edge special effects for their digital or film-based images, and use them on the Web or in print. The easy and approachable writing style demystifies even the most complex Photoshop CC tasks. You'll master every aspect of Photoshop CC -- from image-editing basics to techniques for working with camera raw images. Other topics covered include the File Browser, histogram palette, Lens Blur, Match Color, the color replacement tool, customizable keyboard shortcuts, as well as covering all the new features and enhancements made in the latest version of Photoshop CC.
Lisa DaNae Dayley has a degree in Advertising from Brigham Young University. She has owned and operated a media creation business for 16 years, incorporating writing, graphic design, and video editing over the years. DaNae enjoys teaching PHOP classes locally and after 16 years of working with PHOP is still constantly amazed as the cool stuff it can do! She is the co-author of several books written with her husband Brad Dayley and the author of Photoshop CS3 Extended Video and 3D Bible and Roxio Easy Media Creator 8 in a Snap.
Brad Dayley is a senior software engineer with almost 20 years of experience creating computer applications. He has been working with PHOP for 19 years, enjoying the transition of PHOP from a simple image editor to the powerhouse it is today. He is also the author of the Silverlight 2 Bible and several books. Brad is an avid amateur photographer and spends most of his free time in the remote areas of the western U.S. with his wife DaNae and their four sons.
Lee Ambrosius
AUTOCAD PLATFORM CUSTOMIZATION: USER INTERFACE AND BEYOND
Graphics & Design software (Non-Microsoft) • 978-1-118-79888-1
Paper • US$ 24.99 • 900 • 18.73 x 23.50 cm. • 01/10/2014
AutoCAD Platform Customization is a unique learning resource that teaches readers how to customize and personalize such programs as AutoCAD, AutoCAD LT, Civil 3D, Inventor, Plant 3D, and other programs built on Autodesk’s AutoCAD platform. Written by an Autodesk insider with years of customization experience, the book features detailed discussions backed by real-world examples and tutorials. This e-book features personalization options that offer crucial outcomes such as enforcing drawing and CAD standards, manipulating the drawing environment, automating repetitive tasks, and customizing buttons, ribbons, and palettes on the interface. The book includes an additional resources appendix and features downloadable datasets and customization examples.
Lee Ambrosius (Waukesha, WI) is a Principal Learning Content Developer at Autodesk for AutoCAD and AutoCAD LT products and has worked on the Autodesk API and documentation for six releases. He has presented customization/programming sessions at Autodesk University for eight years, has authored and edited a number of AutoCAD related books , is active in the developer community’s forums, and he blogs at hyperpics.blogs.com and tweets as @leeambrosius.
13
Networking
EMC Education Services
CLOUD INFRASTRUCTURE AND SERVICES: VIRTUALIZATION AND CLOUD INFRASTRUCTURE TECHNOLOGY CONCEPTS AND PRINCIPLES
Networking • 978-1-118-78723-6
Cloth • US$ 60.00 • 544 • 18.73 x 23.50 cm. • 12/20/2013
Cloud Infrastructure and Services educates readers about cloud deployment and service models, cloud infrastructure, and the key considerations in migrating to cloud computing. Using the U.S. National Institute of Standards and Technology as a definitive guide, the book covers technologies required to build classic (traditional), virtualized, and cloud data center environments. These technologies include compute, storage, networking, desktop and application virtualization. Additional areas of focus include business continuity, security, and management.
Readers will learn about the key considerations and steps involved in transitioning from the current state of their data center to a cloud computing environment. Upon completing this book, -readers will have the knowledge to make informed decisions about migrating to cloud infrastructure and choosing the best deployment model for their organization. The book will cover:
Cloud overview, foundations, benefits, trends
Cloud service models, deployment models, brokers, adoption
Compute, network and storage classic and virtual infrastructure & management
Application & Desktop implications & transformation
Cloud availability, security, service creation and service management
EMC employs approximately 60,000 people worldwide with 400 sales offices and scores of partners in 86 countries around the world and R&D centers in Belgium, Brazil, China, France, Ireland, India, Israel, the Netherlands, Russia, Singapore, and the U.S., and manufacturing facilities in the U.S. and Ireland. EMC ranks 152 in the Fortune 500. In 2011, EMC achieved revenue of $20 billion. EMC owns VMWare, Greenplum, RSA security in addition to numerous small companies. In March 2013 EMC and VMware officially launched the Pivotal Initiative, a big data and cloud platform company.
14
Rynardt Spies, Matt Liebowitz, Christopher Kusek
VMWARE VSPHERE PERFORMANCE: SOLVING CPU, MEMORY, STORAGE, AND NETWORKING ISSUES
Operating Systems (General) • 978-1-118-00819-5
Paper • US$ 59.99 • 552 pages • 18.73 x 23.50 cm. • 01/02/2014
Solving performance problems of a computing environment requires an understanding of the interactions between software and hardware. A virtual environment adds new software layers and new types of interactions that must be considered when solving performance problems. VMware vSphere Performance: Solving CPU, Memory, Storage, and Networking Issues helps VMware system administrators and engineers by providing guidance on common CPU, memory, storage, and network-related problems. You will find step-by-step instructions for solving the problems as well as explanation of possible root-causes. You will learn about troubleshooting methodologies, performance monitoring tools, and tools that isolate performance problems. Coverage also includes best practices for designing and virtualizing mission critical applications with VMware vSphere.
Matt Liebowitz is an Advisory Solution Architect with EMC Consulting with a focus on helping customers virtualize business critical applications. He is a published author, blogger, and VMware vExpert who has been working in the field of virtualization since 2002. Matt blogs on virtualization at http://www.thelowercasew.com and can be found on Twitter at @mattliebowitz.
Christopher Kusek is a Technology Visionary and Internet personality known as @cxi on Twitter. A VMware vExpert, he has worked for such enterprise vendors as EMC and NetApp, leading global teams of Virtualization and Cloud professionals. He is currently leading the charge of Virtualization for the war effort in Operation Enduring Freedom in Afghanistan.
Rynardt Spies is a Private Cloud Virtualization and Automation Consultant with one of the largest IT service providers in Europe. He has worked with enterprise x86 virtualization technologies since 2004 and has experience in designing, implementing and managing large vSphere infrastructures. Rynardt maintains a virtualization website, www.virtualvcp.com. He has been named VMware vExpert in 2009, 2010, and 2013.
15
Bruce Dang, Alexandre Gazet, Elias Bachaalany
PRACTICAL REVERSE ENGINEERING: USING X86, X64, ARM, WINDOWS KERNEL, AND REVERSING TOOLS
Networking / Security • 978-1-118-78731-1
Paper • US$ 50.00 • 336 • 18.73 x 23.50 cm. • 01/29/2014
This book provides a systematic approach to reverse engineering. Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides:
Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM (Advanced RISC Machine) is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple’s i-devices run on ARM. This book will be the first book to cover all three.
Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.
The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans/rootkits as examples congruent with real-life scenarios
Hands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
Bruce Dang is a senior security development engineering lead at Microsoft working on security technologies in unreleased Microsoft products. Previously he worked on security vulnerabilities reported to Microsoft and was the first to publicly share analytical techniques for targeted attacks with Office documents. He and his team analyzed the famous Stuxnet malware which supposedly attacked the Iranian uranium enrichment process. He has spoken at RSA, BlackHat Vegas, BlackHat Tokyo, Chaos Computer Club, RECON, and many other industry conferences.
Alexandre Gazet is a senior security researcher at QuarksLab. His focus is on reverse engineering, software protection and dynamic binary instrumentation as well as hardened binary analysis and de-obfuscation and low level security and embedded firmware analysis.
Elias Bachaalany is a software security engineer at Microsoft. Prior to joining Microsoft, Elias worked for Hex-Rays Belgium developing various debugger plugins and worked extensively on improving scripting facilities in IDA Pro and developing new features into IDA Python.
16
Andrew Oliviero, Bill Woodward
CABLING: THE COMPLETE GUIDE TO COPPER AND FIBER-OPTIC NETWORKING, 5TH EDITION
Computer Hardware (general) • 978-1-118-80732-3
Paper • US$ 89.99 • 1200 • 18.73 x 23.50 cm. • 03/14/2014
Cabling is crucial to every network. Correct use of cables helps build a reliable, high performance network; wrong use of cables can doom a network to performance problems, outages, and constant troubleshooting. We are currently in the midst of a huge transition from copper cabling to fiber optics for large-scale communications networks. Fiber optics is a technology that uses glass or plastic fibers to transmit data. A fiber optic cable consists of a bundle of glass threads capable of transmitting messages modulated onto light waves, which allow data to be transmitted at the rate of speeds IEEE are currently producing.
Andrew Oliviero is involved in the development of optical fiber cabling standards in TIA, IEC, ISO, and IEEE. He was involved in the development of the ANSI/TIA-568-C standard and has held the Chair position of TIA's Fiber Optic LAN Section in 2007. Andrew holds a B.S.E and Ph.D. in Chemical Engineering from the University of Pennsylvania and the University of Massachusetts. Bill Woodward has served three terms as chairman of the Electronics Technicians Association and is a principal electrical engineer based in Chesapeake, Virginia. Bill is also the committee chairman of the ETA fiber optic installer (FOI), fiber optic technician (FOT), and fiber optic designer (FOD) certification programs.
Photography
J. Dennis Thomas
THE ART AND STYLE OF PRODUCT PHOTOGRAPHY
Digital Cameras & Photography • 978-1-118-72147-6
Paper • US$ 34.99 • 288 pages • 18.73 x 23.34 cm. • 12/20/2013
The quality of a product's photograph is very important to how it is viewed whether it is on-line or in print. Having a high quality image is key in selling your products. Product photography is a skill that can take some time to master. In Product Photography, author J. Dennis Thomas will guide readers through the basics of product photography from selecting the right equipment, practicing different lighting techniques, controlling exposure and using backgrounds, props and more. Product Photography will give new and even experienced photographers the tools and resources needed to further their product photography career.
J. Dennis Thomas is a freelance photographer and author based out of Austin, Texas. He has nearly 25 years of experience behind the lenses of Nikon cameras. His work has been published in many regional and national publications including Rolling Stone, SPIN, Country Weekly, Thrasher, Elle, W Magazine, and US Weekly. His work is syndicated worldwide by Corbis and Associated Press Images. He also works as a freelance photographer for the Austin American Statesman and Austin360.com covering editorial, entertainment, and fashion events.
17
Michele Celentano
NATURAL LIGHT PHOTOGRAPHY
Digital Cameras & Photography • 978-1-118-76780-1
Paper • US$ 34.99 • 320 • 18.73 x 23.34 cm. • 01/24/2014
Natural Light Photography is a guide for photographers who want to learn more about natural, or existing, light photography to successfully capture stunning natural light photography. The book will cover the following in each chapter about light: an overview of the type of light being discussed, learning how to recognize how that lighting will affect photography, learning to effectively use different types of natural light, camera specifications and metering options, as well as plenty of example photographs.
Natural Light Photography will cover using various types of sunlight: direct sun, backlighting, flare, soft light. Also covered will be working with shadows, existing room fixtures (lamps, etc.), working in dark environments such as churches or basements, candles, and other ambient light. With full coverage of color temperatures, white balance, and addressing choosing the proper exposure in any situation, Natural Light Photography will offer readers the guidance they need to successfully capture stunning photographs in any natural light situation.
Michele Celentano After 21 years of experience, Michele's passion for transforming her photography into works of art only continues to grow. Michele was awarded her Craftsmen Degree from the Professional Photographers of America and the Accolade of Photographic Mastery from Wedding and Portrait Photographers International. Her artwork has been published in literary works such as Rangefinder, American Photographer, Shutterbug and Studio Photography. Michele is one of an elite group of photographers to be contracted by Canon USA to represent their company as a spokesperson for the Explorers of Light program. Only 50 photographers nationwide hold this honor. Michele has been featured in numerous advertisements for Canon and their professional line of cameras. In addition to running her portrait business full time, Michele continues to travel internationally to teach and lecture on the subject of professional photography.
18
Programming
Deepak Vohra
BEGINNING JAVA PROGRAMMING: THE OBJECT ORIENTED APPROACH
Object Technologies - Java • 978-1-118-73949-5
Paper • US$ 44.99 • 744 pages • 18.73 x 23.50 cm. • 10/04/2013
Java is one of the world’s most commonly used programming languages. Many of those eager to start learning Java don’t want just the basics, they want to learn how to apply their new knowledge in the workplace. Beginning Java Programming provides readers a serious education on Java so they can apply their new skills in the real world. The book discusses the fundamentals of Java programming language and is based on the latest version and covers using Java to develop applications in a Java IDE, Eclipse IDE.
The book places an emphasis on OOP principles, and is geared for those who want to use Java in an applied environment while learning Java. Each chapter includes sample programs and screenshots at milestone stage.
The book includes:
Object Oriented Programming
Packages and Imports
Statements
Classes
Variables and Java Types
Interfaces
Methods
Arrays
Exceptions
JVM
The book also is ideal industry training and university use.
Deepak Vohra is an Oracle Certified Associate, Sun Certified Java Programmer, and Sun Certified Web Component Developer. Deepak has published in Oracle Magazine, IBM developerWorks, ONJava, Java World, DevSource, WebLogic Developer’s Journal, XML Journal, Java Developer’s Journal, FTPOnline, and devx. Deepak was the technical reviewer for the O’Reilly’s book: WebLogic The Definitive Guide and Manning’s Prototype and Scriptaculous Quickly. Deepak is a Fellow British Computer Society. Deepak has published seven books on web development including JDBC 4.0 and Oracle JDeveloper for J2EE Development, Ajax in Oracle JDeveloper, Processing XML documents with Oracle JDeveloper 11g, Java 7 JAX-WS Web Services, Pro XML Development with Java Technology, EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g, and Java EE Development with Eclipse.
19
Nick Williams
PROFESSIONAL JAVA FOR WEB APPLICATIONS
Object Technologies - Java • 978-1-118-65646-4
Paper • US$ 59.99 • 870 • 18.73 x 23.50 cm. • 01/24/2014
Professional Java for Web Applications is a comprehensive title that developers can read cover-to-cover when building a complex Java application in an enterprise environment, or pick apart into sections when more knowledge about a particular topic is desired.
Starting with an introduction to the Java Enterprise Edition and the basic web application, readers set up a development application server environment, learn about the tools needed during the development process, and explore numerous Java technologies and practices, including: * Application logging * JSR-303 bean validation * JSR-317 Java Persistence API (with Hibernate) * Spring Framework * Spring Security * Custom JSP tag libraries * WebSocket persistent, fully duplex web connections (new to Java EE 7) Each unit explores a new facet of enterprise application development that builds on the previous unit and enables the reader to jump to a particular point of interest or return to a unit in the future. Readers will not only learn about the industry-standard tools and technologies used in enterprise development, but also enjoy an end-to-end guide to build an enterprise Java application from the ground up, and will explore both specific technologies and the programming concepts that they are built upon. The book is ideal for software developers familiar with Java who have been asked to build enterprise Java applications or would like to expand capabilities in Java to cover enterprise Java applications and web applications. Readers need knowledge in Java Standard Edition, the Web, and basic knowledge in HTML, XML, JavaScript, Structured Query Language (SQL) and relational databases.
Nicholas Williams, Senior Software Developer, UL PureSafety, NWTS Java Code, DNSCrawler.com. At UL PureSafety (formerly PureSafety) Nicholas works extensively with Java Standard Edition, Java Enterprise Edition, Spring Framework, Spring Security, and Hibernate. I have also worked with C#, .NET, .NET MVC and BouncyCastle cryptography. He created the Open Source community NWTS Java Code (http://java.nicholaswilliams.net), where he researches and uses Subversion version control, JetBrains TeamCity and YouTrack, Java cryptography (JCE), and the Java Native Interface (JNI). He is active in the Open Source community, contributing bug reports and suggestions/fixes, feature suggestions and code to projects such as Apache Tomcat, Spring Framework and Spring Security. The Nashville Technology Council named him 2010 Software Engineer of the Year for Middle Tennessee. He is a member of the IEEE, the ARRL, and Williamson County ARES.
20
Nigel Poulton
DATA STORAGE NETWORKING: REAL WORLD SKILLS FOR THE COMPTIA STORAGE+ CERTIFICATION AND BEYOND
Misc (other) certifications • 978-1-118-67921-0
Paper • US$ 59.99 • 500 • 18.73 x 23.50 cm. • 02/21/2014
Candidly written with a focus on real-world experience, this book is the ideal guide for those data storage administrators who are in the trenches. Designed to give the reader the insight of a data storage administrator, this book will cover data storage from top to bottom, inside and out. Starting with the basics, right through to advanced topics, advice, and real-world examples, enabling the reader to understand why and how to deliver world-class solutions in real-world environments. The book will focus on designing, implementing, and administering storage for today's evolving organizations, getting under the hood of the technologies that enable performance, resiliency, availability, recoverability and simplicity. The book will also cover how storage fits in to the wider technology environments prevalent in today's cloud era.
In addition, this is an ideal supplement for those looking to earn their Storage+ (SG0-001) certification. Candidates will be able to use this book to learn relevant information about the different testable concepts, as well as full coverage of the exam objectives, including:
Storage components
Connectivity
Storage management
Data protection
Storage performance
Nigel Poulton is a well-known storage blogger and podcaster, known for his love of storage and deep technical knowledge. He has 15 years IT experience, the last 10 working on data storage. He is currently a storage architect for large global financial organization, working in the Global Storage Strategy & Architecture team. Nigel has done just about everything the storage industry has to offer, all the way from changing backup tapes and plugging in cables, to writing complicated design and architecture documents for petabyte scale environments. Nigel has also written numerous white papers and online articles on data storage.
21
Security
Thomas J. Mowbray
CYBERSECURITY: MANAGING SYSTEMS, CONDUCTING TESTING, AND INVESTIGATING INTRUSIONS
Networking / Security • 978-1-118-69711-5
Paper • US$ 60.00 • 336 pages • 18.73 x 23.50 cm. • 10/24/2013
This book is written to comply with the Comprehensive National Cyber Security Initiative #8: Cybersecurity Education, Cyber Network and will serve as a detailed, hands-on guide for anyone who wants to enter the hands-on security profession, including cybersecurity testing, IT testing/development, and system/network administration. It will also serve as the text for a cybersecurity course at 2 and 4 year colleges and vocational cybersecurity education. The book is also a useful reference for working cybersecurity professionals for techniques such as advanced filtering with Wireshark and tcpdump, command line scripting, network penetration, tool customization, network administration, and log analysis.
Cybersecurity covers basic network administration skills that everyone needs through to advanced command line scripting, tool customization, and log analysis skills that are very useful in every shop, but few professionals have. The book goes deeper into wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations.
In addition to the accompanying course syllabus, PowerPoint slides, and test bank, the ancillaries include downloadable custom scripts for Advanced Log Analysis. The book can be used in tandem with the SEED Project lab exercises at http://www.cis.syr.edu/~wedu/seed/ which are free, open source security labs with a free instructor’s manual. The book’s exercises can be tested using the free version of BackTrack Linux.
Tom Mowbray, Ph.D. is a certified security professional holding gold level certification from the SANS Institute in network penetration, and ethical hacking and is a member of the SANS Advisory Board and the Editorial Board of the Journal of Enterprise Architecture. In addition, he is the founder of the Northrup Grumman Cyber Warfare SIG and the former lab manager and hands-on IT security tester for the Certification and Accreditation Team (CAT Team), an elite team of cyber security experts supporting the US government. Formerly a college professor (Purdue), Tom is currently teaching at the Zachman/FEAC Institute. Tom is the author of previous technology books including a best-seller.
22
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski
ANDROID HACKER'S HANDBOOK
Networking / Security • 978-1-118-60864-7
Paper • US$ 50.00 • 432 • 18.73 x 23.50 cm. • 11/22/2013
The Android Hacker's Handbook presents the specifics of the Android operating system from a security point of view. It explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It explains how vulnerabilities can be found in, and exploits developed for, various components of the system. There are no other books that come close to covering Android security on this level. The book is written by a group of some of the world’s foremost Android security researchers
The ideal reader for this book would be someone who is interested in understanding the intricacies of the security of the Android ecosystem. This includes both implementation details as well as complexities introduced by the open nature of the OS. The person may be a security researcher, mobile device administrator, or consultant responsible for evaluating the security of the Android OS. Also, this person could be an Android application developer hoping to avoid common security pitfalls.
Joshua J. Drake is a Senior Security Research Scientist with Accuvant LABS. He has been researching Android security since 2009, and providing Android consultation to major OEMs. He has spoken at several industry conferences, such as RSA, BlackHat Toorcon, and DerbyCon. At BlackHat USA 2012, Georg and Joshua demonstrated an exploit for the Android 4.0.1 browser.
Georg Wicherski is a Senior Security Researcher with CrowdStrike, mostly analyzing advanced targeted threats but also putting himself in attackers’ shoes from time to time.
Collin Mulliner is a postdoctoral researcher in the Systems Security Lab at Northeastern University. Collin's main interest is the security and privacy of mobile and embedded systems with an emphasis on mobile and smart phones.
Zach Lanier is a Security Researcher with Veracode, where he specializes in mobile application security and static analysis.
Pau Oliva is a Mobile Security Engineer with viaForensics. He has been actively researching security aspects on the Android operating system since its debut with the T-Mobile G1 on October 2008.
Stephen A. Ridley is a security researcher and formerly Senior Security Architect at McAfee, working for a major defense contractor. He has presented at conferences such as: BlackHat, ReCon,EuSecWest, CanSecWest, Syscan and his work has been covered by NPR, Wired, Washington Post and other publications.
23
Bruce Schneier
CARRY ON: SOUND ADVICE FROM SCHNEIER ON SECURITY
Networking / Security • 978-1-118-79081-6
Paper • US$ 29.99 • 336 • 15.24 x 22.86 cm. • 12/11/2013
Covering the most up-to-date and highly praised of his writings, the author will introduce each of the categories: Crime, Terrorism, Spying, and War~~Human Aspects of Security~~Privacy and Surveillance~~Psychology of Security~~Security and Technology~~Security, Policy, Liberty, and Law~~The Business and Economics of Security~~Travel and Security~~Voting More than 160 articles will include (with more than 25 never published in Schneier's blog):
The Boston Marathon Bombing: Keep Calm and Carry On
The Internet is a Surveillance State
How to Create the Perfect Fake Identity
Chinese Cyberattacks: Myth or Menace
Why Obama Should Keep His Blackberry but Won't
Google and Facebook's Privacy Illusion
Is Aviation Security Mostly for Show?
Fixng a Security Problem Isn't Always the Right Answer
Hacking the Papal Election
Bruce Schneier is an internationally renowned security technologist. Described by The Economist as a "security guru," when people want to know how security really works, they turn to Schneier. His first bestseller, Applied Cryptography, was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "a jewel box of little surprises you can actually use." His latest book, Liars and Outliers, explains how societies use security to enable the trust that they need to survive. Regularly quoted in the media he has testified on security before Congress and has written for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, The Washington Post, and the Atlantic. Schneier also publishes a free monthly newsletter, Crypto-Gram, and a blog, Schneier on Security, with a combined 250,000 readers.
24
Davi Ottenheimer
BIG DATA SECURITY
Networking / Security • 978-1-118-55921-5
Paper • US$ 59.99 • 480 pages • 18.73 x 23.50 cm. • 01/23/2014
This book introduces the reader to security concepts relevant to big data; it presents the architectural considerations and steps necessary for defense. Readers will discover how attacks on big data differ from enterprise and other data models and how to best use technology and processes to defend against attacks. Here are four of the topics covered:
Understanding security risks introduced when handling high Volume, Velocity and Variety of Data
Managing trust relationships between hadoop nodes in racks and clusters
Common mistakes made when trying to secure big data
Advancing technology – following the direction of big data controls and emerging solutions
Davi Ottenheimer, President of flyingpenguin, a security consulting firm and has more than seventeen years' experience managing global security operations. He is a frequent top-rated public speaker: BlackHat’s BSidesLV, headliningGigacom’s Big Data Healthcare Project, BlackHat Dubai and the Gulf Information Security Expo and as keynote a security conference in Copenhagen in October. His writings appear in Compliance Week, Search Security, Bank Info Security, Network World, Red Herring, Chain Store Age, Inc, Reuters and SC Magazine. Formerly Davi was responsible for security at Barclays Global Investors (BGI) and Yahoo responsible for managing security for all digital home products. His clients include Cisco, Department of Defense , IBM, Intel, Puget Sound Energy, State Farm, University of California, University of Iowa, and VMware.
25
Jay Jacobs, Bob Rudis
SECURITY USING DATA ANALYSIS, VISUALIZATION, AND DASHBOARDS
Networking / Security • 978-1-118-79372-5
Paper • US$ 50.00 • 360 • 18.73 x 23.50 cm. • 01/23/2014
Everything in the book will have practical application for information security professionals. The entire purpose of data analysis and visualization is to gather feedback from the environment to make better and more informed technology decisions. Within information security that means identifying ways to prevent or detect breaches and then measuring the effectiveness in doing so, which is all wrapped up under "risk management". All of the examples will be directed at answering real-world questions. One of the key points is not just to analyze what is in front of us, but collect and analyze the data we need to answer the questions that will lead to better decisions and prevention of hacks and vulnerabilities.
The book will present the core elements of analyzing I.T. system data and information security feedback by using 30 use cases and domain-specific data sets with a focus on practical “how-to”. This hands-on approach will be covered in context and will not be limited to just the analysis, but all the supporting skills needed to learn from our data. Data analysis from start to finish: from the data collection and preparation through the data storage and management fundamentals then into the analysis and finally data visualization and communication techniques all in the context of security.
Jay Jacobs is the Sr. Data Analyst on Verizon’s RISK team where he collects, analyzes and visualizes information security data. He is a co-author of the Verizon Data Breach Investigations Report series and is a co-founder of the Society of Information Risk Analysts and currently serves on the organization’s board of directors. He is also one of the primary authors of the OpenPERT project, an open-source Excel plug-in for risk analysis. He is a blogger (securityblog.verizonbusiness.com), and a co-host of the Risk Science podcast. Jay writes frequently on cryptographic key management and risk analysis and speaks regularly on security and data analysis.
Bob Rudis is a 20-year veteran of IT and Security and has consulted in and worked for many of the largest global enterprises. Bob currently directs Enterprise Information Risk Management for Liberty Mutual Insurance. He writes frequently for Security Focus and FedTech Magazine and SANS, and posts regularly to his own blog (rud.is) on technology, data analysis & visualization and information security. He is currently on the Board of Directors for the Society of Information Risk Analysis and has been named one of the Top 25 Influencers in Information Security by Tripwire.
26
Christopher Hadnagy, Dr. Paul Ekman
UNMASKING THE SOCIAL ENGINEER: THE HUMAN ELEMENT OF SECURITY
Networking / Security • 978-1-118-60857-9
Paper • US$ 34.99 • 336 pages • 15.24 x 22.86 cm. • 01/27/2014
Unmasking the Social Engineer: The Human Element of Security digs into nonverbal human communications and how it affects social engineering. This book delves deep into how attacks against companies and individuals use nonverbal communications every day. It explains nonverbal communications and demonstrates with visuals, the connection of non-verbal behavior to social engineering and scamming. The reader will gain the knowledge needed to help protect their organization. The book clearly combines both the practical and technical aspect of the social engineer revealing all the various dirty tricks that scammers use as well as pinpoints what to look for on the nonverbal side to detect the social engineer.
What is nonverbal communication?
What is Social Engineering?
Understanding the Language of the Hands
Science Behind the Torso, Legs and Feet
The Science Behind the Face - Understanding the 7 base emotions and how they are displayed
The Limbic System and social Engineering
The Moral Molecule - Trust and the Social Engineer
The Power of Empathy in Social Engineering
Using Nonverbals as a Social Engineer
Chris Hadnagy is a worldwide consultant on the "human" aspect of security technology: social engineering. He provides training to the Fortune 500 (Sony, LockHeed Martin, etc.) analyzing malicious attacks by social engineers/hackers and then provides step-by-step prevention techniques. Chris is a frequest speaker at RSA and major security conferences and is the author of Wiley’s best-selling book, Social Engineering: The Art of Human Hacking.
Dr. Paul Ekman is a pioneer in the study of nonverbal behavior. He was among TIME Magazine’s Top 100 most influential people in 2009. His work has been covered in Time, Smithsonian Magazine, Psychology Today, The New Yorker, New York Times, and the Washington Post. He has appeared on 48 Hours, Dateline, Good Morning America, 20/20, Larry King, Oprah, News Hour with Jim Lehrer, and Bill Moyers’ The Truth About Lying.
27
Index
Abbott, 8 Acing the Java Programming Interview, 9 Alcorn, 10 Ambrosius, 11 Android Hacker's Handbook, 18 Applied Predictive Analytics: Principles and
Techniques for the Professional Data Analyst, 8
AutoCAD Platform Customization: User Interface and Beyond, 11
Bachaalany, 13 Beginning Java Programming: The Object
Oriented Approach, 15 Big Data Security, 20 Big Data: Understanding How Data Powers Big
Business, 5 Cabling Part 1: LAN Networks and Cabling
Systems, 5th Edition, 14 Cabling Part 2: Fiber-Optic Cabling and
Components, 5th Edition, 14 Cabling: The Complete Guide to Copper and
Fiber-Optic Networking, 5th Edition, 14 Carry On: Sound Advice from Schneier on
Security, 19 Celentano, 15 Cloud Infrastructure and Services: Virtualization
and Cloud Infrastructure Technology Concepts and Principles, 12
Couzin, 6 Cybersecurity: Managing Systems, Conducting
Testing, and Investigating Intrusions, 18 DaNae Dayley, 11 Dang, 13 Data Storage Networking: Real World Skills for
the CompTIA Storage+ Certification and Beyond, 17
Dayley, 11 Drake, 18 Ekman, 21 EMC Education Services, 12 Five Stars: Putting Online Reviews to Work for
Your Business, 6 Frichot, 10 Gazet, 13 Gomzin, 8 Grappone, 6 Hacking Point of Sale: Payment Application
Secrets, Threats, and Solutions, 8 Hadnagy, 21 Hart-Davis, 4 Hsu, 7 Jacobs, 20
John, 7 Jorgensen, 6 Kusek, 12 Lanier, 18 Liebowitz, 12 Marketing Analytics: Data-Driven Techniques
with Microsoft Excel, 5 Markham, 9 McFedries, 4 Microsoft Big Data Solutions, 6 Mitchell, 6 Mowbray, 18 Mulliner, 18 Natural Light Photography, 15 Oliva, 18 Oliviero, 14 oodward, 14 Orru, 10 Ottenheimer, 20 Poulton, 17 Practical Reverse Engineering: Using x86, x64,
ARM, Windows Kernel, and Reversing Tools, 13
Price, 6 Professional Java for Web Applications, 16 Programmer's Bootcamp: Improve your Skills,
Land a Job, 7 Ridley, 18 Rowland-Jones, 6 Rudis, 20 Schmarzo, 5 Schneier, 19 Security Using Data Analysis, Visualization, and
Dashboards, 20 Spies, 12 Teach Yourself VISUALLY Complete Mac Pro, 4 Teach Yourself VISUALLY MacBook Air, 4 Teach Yourself VISUALLY Raspberry PI, 7 The Art and Style of Product Photography, 14 The Browser Hacker's Handbook, 10 Thomas, 14 Unmasking the Social Engineer: The Human
Element of Security, 21 VMware vSphere Performance: Solving CPU,
Memory, Storage, and Networking Issues, 12 Vohra, 15 Welch, 6 Wentk, 7 Wicherski, 18 Williams, 16 Winston, 5