New Perspectives Computer Concepts 2018


Book Description

Technology impacts every aspect of life and choices are endless. As a college student, you need to know how to evaluate devices, choose apps, maintain a compelling online reputation, and lock down digital security. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2018, INTRODUCTORY goes beyond the intuitive "how-to" of apps and social media to delve into the broad concepts that are guiding current technologies such as self-driving cars, virtual reality, file sharing torrents, encrypted communications, photo forensics, and the Internet of Things. Numerous illustrations and interactive features in this complete book make mastering technical topics a breeze with a learning path that is structured with you, today's busy student, in mind. This edition offers an insightful overview of what every college student should know about using technology to complete your education, launch a successful career, and engage in issues that shape today's world.




Ethics in Information Technology


Book Description

Ethics in Information Technology, Second Edition is a timely offering with updated and brand new coverage of topical issues that we encounter in the news every day such as file sharing, infringement of intellectual property, security risks, Internet crime, identity theft, employee surveillance, privacy, and compliance.




Fundamentals of Python


Book Description

Presents the important topics for a CS1 course while preparing your students to study additional languages. This book uses the Python programming language, which is both easy to learn for beginners and scales well to advanced applications.




Principles of Information Systems


Book Description

Now thoroughly streamlined and revised, PRINCIPLES OF INFORMATION SYSTEMS, Ninth Edition, retains the overall vision and framework that made the previous editions so popular while eliminating outdated topics and updating information, examples, and case studies. In just 600 pages, accomplished authors Ralph Stair and George Reynolds cover IS principles and their real-world applications using timely, current business examples and hands-on activities. Regardless of their majors, students can use this book to understand and practice IS principles so they can function more effectively as workers, managers, decision makers, and organizational leaders. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.




Guide to Computer Forensics and Investigations


Book Description

Updated with the latest advances from the field, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS, Fifth Edition combines all-encompassing topic coverage and authoritative information from seasoned experts to deliver the most comprehensive forensics resource available. This proven author team's wide ranging areas of expertise mirror the breadth of coverage provided in the book, which focuses on techniques and practices for gathering and analyzing evidence used to solve crimes involving computers. Providing clear instruction on the tools and techniques of the trade, it introduces readers to every step of the computer forensics investigation-from lab set-up to testifying in court. It also details step-by-step guidance on how to use current forensics software. Appropriate for learners new to the field, it is also an excellent refresher and technology update for professionals in law enforcement, investigations, or computer security. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.




Introduction to Business


Book Description

Introduction to Business covers the scope and sequence of most introductory business courses. The book provides detailed explanations in the context of core themes such as customer satisfaction, ethics, entrepreneurship, global business, and managing change. Introduction to Business includes hundreds of current business examples from a range of industries and geographic locations, which feature a variety of individuals. The outcome is a balanced approach to the theory and application of business concepts, with attention to the knowledge and skills necessary for student success in this course and beyond. This is an adaptation of Introduction to Business by OpenStax. You can access the textbook as pdf for free at openstax.org. Minor editorial changes were made to ensure a better ebook reading experience. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution 4.0 International License.




The Basics of Hacking and Penetration Testing


Book Description

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test




Principles of Management


Book Description

Black & white print. Principles of Management is designed to meet the scope and sequence requirements of the introductory course on management. This is a traditional approach to management using the leading, planning, organizing, and controlling approach. Management is a broad business discipline, and the Principles of Management course covers many management areas such as human resource management and strategic management, as well as behavioral areas such as motivation. No one individual can be an expert in all areas of management, so an additional benefit of this text is that specialists in a variety of areas have authored individual chapters.




Systems Analysis and Design


Book Description

Systems Analysis and Design,Video Enganced International Edition offers a practical, visually appealing approach to information systems development.




Principles of Information Security


Book Description

Discover the latest trends, developments and technology in information security with Whitman/Mattord's market-leading PRINCIPLES OF INFORMATION SECURITY, 7th Edition. Designed specifically to meet the needs of information systems students like you, this edition's balanced focus addresses all aspects of information security, rather than simply offering a technical control perspective. This overview explores important terms and examines what is needed to manage an effective information security program. A new module details incident response and detection strategies. In addition, current, relevant updates highlight the latest practices in security operations as well as legislative issues, information management toolsets, digital forensics and the most recent policies and guidelines that correspond to federal and international standards. MindTap digital resources offer interactive content to further strength your success as a business decision-maker.