Computer Concepts Illustrated is designed to help students learn and retain the most relevant and essential information about computers and technology in today's digital world! This edition has been r
Get Synched! Learning happens when students and instructors effectively connect and communicate. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2013 makes it possible. This edition goes beyond the computer bas
Get Synched! Learning happens when students and instructors effectively connect and communicate. NEW PERSPECTIVES ON COMPUTER CONCEPTS 2013 makes it possible. This edition goes beyond the computer bas
INTEGRATED COMPUTER APPLICATIONS 6E challenges users to combine all of the tools of Microsoft Office 2010 plus Web computing to create relevant workplace solutions. Real-world projects plus an easy-to
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network security daily. DATABASE SECURITY delivers the know-how and skills IT Professi
This book is geared toward helping information security managers by providing concise guidance on assessing and improving an organization's security. It also addresses the needs of IT managers as they
The fourth edition of Principles of Information Security explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Reader
The Hands-On Information Security Lab Manual, Third Edition by Michael E. Whitman and Herbert J. Mattord is the perfect addition to the Course Technology Information Security series, including the Wh
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an extern
This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security stud
READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text
Master the skills necessary to launch and complete a successful computer investigation with the updated fourth edition of this popular book, GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS. This resour
Bring your computer literacy course back to the BASICS. COMPUTER LITERACY BASICS: A COMPREHENSIVE GUIDE TO IC3 provides an introduction to computer concepts and skills, which maps to the newest Compu
Looking for a solution to get your students started in the computer world? This introductory text, CENTURY 21, JR. INPUT TECHNOLOGIES AND COMPUTER APPLICATIONS, 2e is the perfect companion for navigat
Do you want to learn how to create computer war games, but don't know how to get started or don't have any experience with game programming? "Going to War: Creating Computer War Games" shows you how t
"CompTIA Security+ 2008 In Depth" gives you the coverage you need to pass CompTIA?s latest Security+ exam and to fully understand the current risks and threats to an organization?s data. If you are j
The Computer Technology Encyclopedia is a handy reference for students and professionals. Going beyond basic definitions, this comprehensive reference provides descriptions of computer technology term
INTRODUCTION TO PRIVATE SECURITY, Fifth Edition, provides a comprehensive, accessible, state-of-the-art overview of private security, its principles, its legal authority, its growing role in the crimi
Computer Literacy BASICS: Microsoft Office 2007 Companion is designed to accompany Computer Literacy BASICS, Second Edition, providing updated coverage on Office 2007. Step-by-step instructions provid
Hands-On Information Security Lab Manual provides instructors with detailed, hands-on exercises in information security management and practice. This lab text addresses the need for a quality, general
Explore the principles and practices of banking and credit in the United States with THE U.S. BANKING SYSTEM 3E. The newly revised version of this text guides users through an overview of financial se
Powerful computer support is vital to the successful execution of projects and the effective management of them. It is very important to schedule and track construction projects, as these may involve
Gain the full understanding of today's digital world with the cohesive framework and logical organization found only in NEW PERSPECTIVES ON COMPUTER CONCEPTS 2016, ENHANCED, INTRODUCTORY. This dynamic
Introduce the basic concepts of power systems as well as the tools students need to apply these skills to real world situations with POWER SYSTEM ANALYSIS AND DESIGN, 6E. This new edition highlights p
Written by acclaimed national terrorism expert Jonathan R. White, market-leading TERRORISM AND HOMELAND SECURITY is widely recognized as the most comprehensive, balanced, and objective text available
The Milady Standard Haircutting System is a formalized system designed to make learning the foundational principles of haircutting easier, while ensuring a solid understanding of the technical and cre
Specifically oriented to the needs of information systems students, PRINCIPLES OF INFORMATION SECURITY, 5e delivers the latest technology and developments from the field. Taking a managerial approach,
Current or future user-support professionals discover the critical people skills and exceptional technical knowledge to provide outstanding support with Beisse's A GUIDE TO COMPUTER USER SUPPORT FOR H
INTRODUCTION TO LAW AND THE LEGAL SYSTEM provides an overview of law and the American legal system, using cases to support the major functions of U.S. law. Suitable for a variety of departments and co
Written with the installing electrician in mind, THE GUIDE TO PHOTOVOLTAIC SYSTEM INSTALLATION provides readers with a simple, straightforward approach to understanding photovoltaic system installatio
Written by acclaimed national terrorism expert Jonathan R. White, the market-leading TERRORISM AND HOMELAND SECURITY is widely recognized as the most comprehensive, balanced, and objective terrorism b
Current or future user-support professionals discover the critical people skills and exceptional technical knowledge to provide outstanding support with Beisse's A GUIDE TO COMPUTER USER SUPPORT FOR H
ICD-10-CM DIAGNOSTIC CODING SYSTEM fully prepares current and future medical coders for the transition to ICD-10-CM coding system that will go into effect on October 1, 2013. This comprehensive guide
Discover one of the most efficient, effective, and inexpensive ways to stop Internet threats and protect your organization or home from malware and objectionable content with Internet Security You Can
With a background in computer science and mathematics, Lengyel has been writing game engines for over 16 years. Here he describes the mathematical techniques that a software engineer needs to develop
INTRODUCTION TO LAW AND THE LEGAL SYSTEM provides an overview of law and the American legal system, using cases to support the major functions of U.S. law. Suitable for a variety of departments and c
With their best-selling astronomy textbook, UNIVERSE: SOLAR SYSTEM, STARS, AND GALAXIES, authors Mike Seeds and Dana Backman help you understand your place in the universe--not just your location in s
Written by acclaimed national terrorism expert Jonathan R. White, the market-leading TERRORISM AND HOMELAND SECURITY, 7th Edition is widely recognized as the most comprehensive, balanced, and objecti
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It s