wiley technology rights guide fbf 13

27

Click here to load reader

Upload: john-wiley-and-sons

Post on 09-Mar-2016

246 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Wiley Technology Rights Guide FBF 13

FRANKFURT

2013

Technology Rights Guide

Page 2: Wiley Technology Rights Guide FBF 13

2

WILEY US RIGHTS TEAM Professional development and higher education titles

published US, Canada & all For Dummies

Kristin Kliemann VP, Director of Global Rights Tel: +1-201-748-6412 [email protected] Marc Mikulich VP, Brand Management & International Rights Tel: +1-201-748-5605 [email protected] Joseph Grosso Japanese professional development, German, French, Tel: +1-201-748-6683 [email protected] Ashley Mabbitt Dutch, Portuguese, Spanish rights Tel: +1-201-748-7798 [email protected] Nicole Feanny Scandinavian, Polish, Russian, Ukrainian, and Baltic language rights Tel: +1-201-748-8710 [email protected] Jessica Roslin English reprint Eastern European excl. Polish, Middle Eastern, Tel: +1-201-748-7733 [email protected] Natasha De Bernardi Italian rights [email protected]

WILEY UK RIGHTS TEAM Global STM, Professional development and higher

education titles published UK, Singapore & Australia All languages except Asian languages.

Jen Holton Associate Director, Global Rights U.K. Tel: +44-1243-770-542 [email protected] Sue Mattingley Medicine & health sciences Tel: +44 1865 47 6152 [email protected] Julie Attrill Higher education, professional development and physical science Tel: +44-1243-770-646 [email protected] Dale Morgan Social science & humanities and life science Tel: +44-1865-476-153 [email protected]

WILEY ASIA RIGHTS TEAM Titles from all locations, all Asian languages, except

Japanese professional development titles

Kate Song/Elena Luo/Iris Wang Simplified Chinese Tel: +86-10-8418-7815 [email protected] Pauline Pek/Feifan Li/Cheryl Lee Bahasa Indonesian, Japanese, Korean, Orthodox Chinese, Thai, and Vietnamese Tel: +65-6-6438-090

[email protected]

Page 3: Wiley Technology Rights Guide FBF 13

3

Table of Contents

Apple ............................................................................................................................... 4 General Computing & Internet ......................................................................................... 5 Graphic & Multimedia .................................................................................................... 12

Networking .................................................................................................................... 13 Photography .................................................................................................................. 16 Programming ................................................................................................................. 18 Security ......................................................................................................................... 21

Page 4: Wiley Technology Rights Guide FBF 13

4

Apple

Guy Hart-Davis

TEACH YOURSELF VISUALLY MACBOOK AIR

Computer Hardware / Macintosh • 978-1-118-81628-8

Paper • 352 pages • 18.73 x 23.34 cm. • 11/15/2013

Teach Yourself VISUALLY MacBook Air offersa visually appealing approach to step-by-step instruction with full color spreads that bring each step into clear view. From basic steps, such as powering on or shutting down the MacBook Air to working with OS X and Mission Control and Launchpad to downloading applications from the Mac App Store and running Windows applications, Teach Yourself VISUALLY MacBook Air covers all the vital information and provides the help and support a reader needs--in many ways it's like having an Apple Genius at one’s side helping tackle questions that may arise. Teach Yourself VISUALLY MacBook Air will cover new hardware updates, the latest version of Mac OS X, iCloud, FaceTime, and more.

Guy Hart-Davis (Barnard Castle, UK) is the author of more than 40 computing books, including Mac OS X Leopard QuickSteps, How to Do Everything with Your iPod & iTunes, and iMacs Portable Genius. He also writes about PCs, Windows, Linux, and VBA.

Paul McFedries

TEACH YOURSELF VISUALLY COMPLETE MAC PRO

Operating Systems / Macintosh & iOS • 978-1-118-82645-4

Paper • 576 pages • 18.73 x 23.50 cm. • 12/06/2013

The forthcoming Mac Pro is a completely new vision of what a desktop computer can be. And the upgrades and futuristic new features are not just limited to the exterior design. The internal hardware with all-Flash memory, rock solid architecture, and connection ports galore all sit at the bleeding edge of desktop computer technology. Teach Yourself VISUALLY Complete Mac Pro demonstrates essential tasks readers need to know in working with their new Mac Pros, while also offering top tips and advice on getting the most out of the bleeding edge device. This book helps them customize their Mac Pros, make the most of their digital media, interact with common pro level software and discover what's new with the latest OS from Apple, including Game Center, Messages, and Notifications as well as features unique to this industry leading new desktop. Using plentiful, detailed screenshots and illustrations, and straight-forward step-by-step instructions, anyone wanting to know how to get the most from Apple's masterpiece of a computer will benefit from this book.

Paul McFedries (Toronto, Ontario) is the president of Logophilia Limited, a technical writing company. He has been programming since he was a teenager in the mid-1970s, has programmed everything from mainframes to desktops to bar code scanners, and has worked with many different languages, including Fortran, assembly language, C++, and, of course, JavaScript. Paul has written more than three dozen books that have sold more than two million copies worldwide. These books include iPhone 5 Portable Genius and Teach Yourself VISUALLY Mac OS X Mountain Lion. Paul encourages all readers to drop by his Web site, www.mcfedries.com.

Page 5: Wiley Technology Rights Guide FBF 13

5

General Computing & Internet

Bill Schmarzo

BIG DATA: UNDERSTANDING HOW DATA POWERS BIG BUSINESS

Database & Data Warehousing Technologies • 978-1-118-73957-0

Paper • US$ 39.95 • 208 pages • 18.73 x 23.50 cm. • 09/20/2013

This book provides “how to” advice and a series of pragmatic methodologies (with accompanying hands-on exercises) for helping organizations leverage big data analytics to power, or re-wire, their value chains. Organizations struggle identifying where and how to leverage these new structured and unstructured data sources and new big data technology innovations to delivery business value. Consequently, many organizations default to taking a technology-led approach to their big data strategies. Leading companies find ways to leverage data – especially new sources of data – to tease out new insights about their customers, products, operations, competitors and markets. And these organizations leverage these insights to improve their customer experiences, create new, more compelling products and create new sources of competitive differentiation.

Providing pragmatic advice to help organizations identify specific areas of the business where and how big data can power or rewire their value creation processes, the book will cover:

Decomposing your organization’s business strategy in order to link your big data initiatives to your organization’s value creation processes

Review and understand different value creation processes and models

Envisioning exercises

Operationalizing big data including organizational structures, education challenges and new big data-related roles

Bill Schmarzo is the Chief Technical Officer for Enterprise Information Management for EMC. Bill is referred to as the “Dean of Big Data” where he is responsible for setting strategy for EMC’s Big Data consulting business. He has been immersed in the worls of big data for more than 20 years with experience in data warehousing, business intelligence and analytic applications. Previously, Bill was Vice President of Advertiser Analytics at Yahoo. As EMC’s Big Data evangelist, Bill speaks around the world. He created the Business Benefits Analysis methodology that links an organization’s strategic business initiatives with their supporting data and analytic requirements, and co-authored with Ralph Kimball a series of articles on analytic applications. He has also served on The Data Warehouse Institute’s faculty as the head of the analytic applications curriculum.

Page 6: Wiley Technology Rights Guide FBF 13

6

Wayne L. Winston

MARKETING ANALYTICS: DATA-DRIVEN TECHNIQUES WITH MICROSOFT EXCEL

Database & Data Warehousing Technologies • 978-1-118-37343-9

Paper • US$ 49.99 • 648 pages • 18.73 x 23.50 cm. • 11/27/2013

Marketing Analytics: Data-Driven Techniques with Microsoft Excel shows business managers and data analysts how to use a relatively simple tool--Excel--to analyze useful business information using powerful analytic techniques. This comprehensive book shows how to use each technique to solve a practical businenss problem and achieve optimum marketing results.

Wayne L. Winston is the John and Esther Reese chaired Professor of Decision Sciences at the Kelley School of Business at Indiana University. He has also taught data modeling at major organizations such as 3M, Cisco, US Army, Eli Lilly, Deloitte Consulting, and Microsoft. He has won more than 30 teaching awards. The author has written over a dozen books including Data Analysis and Business Modeling with Excel and Data Analysis and Decision Making (with Chris Albright).

Adam Jorgensen, John Welch, Christopher Price, Brian Mitchell, James Rowland-Jones

MICROSOFT BIG DATA SOLUTIONS

Database & Data Warehousing Technologies • 978-1-118-72908-3

Paper • US$ 49.99 • 408 • 18.73 x 23.50 cm. • 01/07/2014

The book will show readers how to get their organization set up for Big Data using Microsoft technologies as well as open source tools. The book will focus on Microsoft's new Big Data platform--HDInsight--showing readers how to use HDInsight to store, manage, analyze, and share Big Data throughout the enterprise. The author will cover both on-premises and cloud-based solutions. The book details best practices for integrating these solutions with technologies they already have and know--including SQL Server and Hadoop. Solutions will be illustrated with case studies from real world implementations. After reading this book, readers will have a detailed road map for designing and implementing a fully deployed Big Data solution

Adam Jorgensen is the President of Pragmatic Works Consulting, a global BI solutions firm that delivers SQL Server, SharePoint and Business Intelligence solutions. Adam is a Director at large for the Professional Association of SQL Server (SQL PASS); and a Microsoft SQL Server MVP.

Page 7: Wiley Technology Rights Guide FBF 13

7

Gradiva Couzin, Jennifer Grappone

FIVE STARS: PUTTING ONLINE REVIEWS TO WORK FOR YOUR BUSINESS

Internet Business • 978-1-118-68944-8

Paper • US$ 29.99 • 264 pages • 18.73 x 23.50 cm. • 01/09/2014

While most businesses know the importance of online reviews on sites such as Yelp.com, they have no clue how to grab the reins and help shape the conversation around their service or product. This detailed, comprehensive guide covers the tools, tactics, and techniques for getting and leveraging reviews to increase sales. Featuring the same conversational, empowering tone that helped make the authors’ SEO: An Hour a Day books best-sellers, Five Stars is a concise yet comprehensive reference for small business owners, marketers, and social media managers that covers everything from getting more and better reviews, using tools to track and monitor reviews on such sites as Yelp.com, how to integrate reviews on their own sites, leverage this content in social media and other channels, and such other crucial topics as handling negative reviews and leveraging mobile’s impact. Featuring detailed commentary, great how-tos and fascinating case studies, this unique book is sure to help today’s savvy marketing practitioners capitalize on this important content marketing practice.

Online marketing consultants Jennifer Grappone and Gradiva Couzin have improved the online presence of a wide variety of companies in entertainment, software, non-profit, and retail for over a decade. They work with clients to develop and implement thoughtful, results-oriented strategies for SEO, social media, and paid search using a holistic approach that combines good writing, compelling content, search-friendly site design and usability, all informed by meaningful metrics. Equally adept with B2B and B2C, the human element and technical details, and local and international targeting, together they deliver a well-rounded, left-brain/right-brain approach to their clients' digital strategies.

Richard Wentk

TEACH YOURSELF VISUALLY RASPBERRY PI

Computer Hardware • 978-1-118-76819-8

Paper • US$ 29.99 • 320 pages • 18.73 x 23.34 cm. • 01/31/2014

The Raspberry Pi is the world’s most popular computer in its price range—$35! The Raspberry Pi is popular with schools and would be computer professionals, technology developers, and researchers as a low-cost system on a board that can be used in countless ways. The Raspberry Pi was initially developed for the education sector with the intent of providing students with a low cost computer that they could study and tinker with. The concept caught on not only with students, but also with aspiring and industrious computer professionals interested in seeing what they could do with a low cost system on a board.

The Raspberry Pi can be easily used as a stand-alone computer, a home theatre media hub, a system server, and much more! Teach Yourself VISUALLY Raspberry Pi brings Raspberry Pi projects to life with vivid full-color images, well-illustrated circuit diagrams, and step-by-step practical advice, covering everything from working with the included software to branching out into typical but more complex endeavors with the $35 Raspberry Pi.

Richard Wentk is a developer with more than fifteen years’ experience in publishing, and is one of the UK's most reliable technology writers. He covers Apple products and developments for MacWorld and MacFormat magazines, and also writes about technology and business strategy for titles such as Computer Arts and Future Music. As a trainer and a professional developer who currently focuses on iOS, he's uniquely placed to explain the development process in a way that emphasizes benefits, avoids pitfalls and bear traps, and clarifies memorable key points.

Page 8: Wiley Technology Rights Guide FBF 13

8

Jimmy John, William Hsu

PROGRAMMER'S BOOTCAMP: IMPROVE YOUR SKILLS, LAND A JOB

Programming & Software Development • 978-1-118-82840-3

Paper • US$ 39.99 • 312 • 18.73 x 23.50 cm. • 02/07/2014

This book teaches best practices for software design and development that can be used in any major programming language. In this book, the authors dissect dozens of different types of coding challenges of all difficulty levels, step by step. (Many of these challenges are derived from challenges the world’s top companies regularly use.) Readers can then go to the interactive website powered by CodeEval to take the challenge and test their skills as they learn.

Jimmy John founded CodeEval, a developer community that to date has created and hosted more than 100,000 coding challenges for its members and clients. Prior to founding CodeEval, he was the lead developer at Splunk (SPLK) and was behind many of Transunion’s payment technologies.

William Hsu is a software developer and the co-founder of CodeEval. Previously he founded Textbo (acquired by Koofers) and worked at TechCrunch and Apple.

Slava Gomzin

HACKING POINT OF SALE: PAYMENT APPLICATION SECRETS, THREATS, AND SOLUTIONS

Networking / Security • 978-1-118-81011-8

Paper • US$ 60.00 • 384 • 18.73 x 23.50 cm. • 02/03/2014

Hacking Point of Sale describes the payment application security as a journey from the failure of the “security through obscurity” approach to the power of real cryptographic solutions. All aspects of card-payment processing, from the structure of magnetic stripes to the architecture and deployment models of payment applications, are reviewed from the viewpoint of security. Although there is an entire chapter about PCI, as well as multiple references to the standards (an essential part of the payment industry), the book is not a trivial guide to PCI compliance but looks beyond PCI and provides practical recommendations on how to implement real application security controls. The book covers:

Anatomy of Electronic Payments: Processing Payment Transactions; Architecture of Payment Applications; Security Standards; Attacks on Point-of-Sale Systems

Turning 40 Digits into Gold: Hacking Protected Areas;Penetrating the Security-Free Zone; Exploiting Other Vulnerabilities

Defense: Cryptography in Payment Applications; Protecting Cardholder Data; Securing Application Code

An Appendix provides a Payment Application Security Evaluation Checklist, a handy tool for merchants, software vendors, and security assessors. The checklist will assist in security risk assessment by evaluating the quality of payment application security controls.

Slava Gomzin is the Security Architect for Retalix (RTLX on Nasdaq and the Tel Aviv Exchange), a provider of software and services to more than 70,000 retailer and distributors with more than 400,000 checkout Lanes across more than 50 nations worldwide – with many of its customers ranking among the top retailers in their respective market domains. Slava holds multiple security certifications: CISSP, ISA, PCIP, ECSP, and Security + and has more than 16 years of professional experience in software development and security including app dev for the retail industry and electronic payments, .NET and SQL server dev, and application security and PCI compliance.

Page 9: Wiley Technology Rights Guide FBF 13

9

Dean Abbott

APPLIED PREDICTIVE ANALYTICS: PRINCIPLES AND TECHNIQUES FOR THE PROFESSIONAL DATA ANALYST

Database & Data Warehousing Technologies • 978-1-118-72796-6

Paper • US$ 50.00 • 456 • 19.05 x 23.50 cm. • 02/12/2014

Predictive Analytics shows tech-savvy business managers and data analysts how to use the techniques of predictive analytics to solve practical business problems. It teaches readers the methods, principles, and techniques for conducting predictive analytics projects, from start to finish. The author focuses on best practices---including tips and tricks---that are essential for successful predictive modeling.

The author explains the theory behind the principles of predictive analytics in plain English; readers don't need an extensive background in math and statistics, which makes it ideal for most tech-savvy business and data analysts.

Each of the techniques chapters will begin with a description of the specific technique and how it relates to the overall process model for predictive analytics. The depth of the description of a technique will match the complexity of the approach; the intent is to describe the techniques in enough depth for a practitioner to understand the effect of the major parameters needed to effectively use the technique and interpret the results. For example, with decision trees, the primary algorithms (C5, CART and CHAID) will be described in qualitative terms (what are trees, what is a split), how they are similar and different (Gini vs. Entropy vs. chi-square tests), why one might use one technique over another, how one can be fooled by the models built using each algorithm (i.e., their weaknesses), what knobs one can adjust (depth, complexity penalties, priors, costs, etc.), and how to interpret the results.

Dean Abbott is President of Abbott Analytics, Inc. (San Diego). He is an internationally recognized data mining and predictive analytics expert with over two decades experience in fraud detection, risk modeling, text mining, personality assessment, planned giving, toxicology,and other applications. He is also Chief Scientist of SmarterRemarketer, a company focusing on behaviorally- and data-driven marketing and web analytics. He is a popular speaker at Predictive Analytics and Data Mining conferences, including Predictive Analytics World, Predictive Analytics Summit, the Predictive Analytics Center of Excellence, and SAS Institute. He is on the Advisory Boards for the UC/Irvine Predictive Analytics Certificate and the UCSD Data Mining Certificate programs.

Page 10: Wiley Technology Rights Guide FBF 13

10

Noel Markham

ACING THE JAVA PROGRAMMING INTERVIEW

Programming & Software Development • 978-1-118-72286-2

Paper • US$ 39.99 • 384 • 18.73 x 23.50 cm. • 03/03/2014

Acing the Java Programming Interview provides more than 150 interview questions and solutions that job seekers are likely to encounter when interviewing for Java coding positions. These real-world questions come from real employer interviews, as compiled by the online interview testing site Interview Zen. The book covers three main skill sets: The Interview Process, Core Java, and Java Components and Frameworks. The Interview Process section prepares readers for the various interview formats that can trip up even an experienced programmer. These include telephone screening, technical at-computer or “pair testing", and the softer personality-based interviews. These are the types of questions used to weed out applicants, before getting into detailed questions that drill down into Java itself. For example, basic questions regarding software design patterns, data formats and algorithms.

Noel Markham is an experienced interviewer and Java developer with experience across technology, financial and gaming industries. Most recently he has been working in startups for social gaming and digital entertainment. He has hosted interviews for all experience levels of developer, from graduates to technical leaders. As well as leading IT graduate recruitment for some universities for his employer, he has run assessment centres in the UK and overseas to set up full development teams. For this title, he will partner with Interview Zen---the online programming interview test site.

Page 11: Wiley Technology Rights Guide FBF 13

11

Wade Alcorn, Christian Frichot, Michele Orru

THE BROWSER HACKER'S HANDBOOK

Networking / Security • 978-1-118-66209-0

Paper • US$ 55.00 • 600 • 18.73 x 23.50 cm. • 03/05/2014

The book demonstrates not only that hackers can target your browser, but how; it shows how hackers can use your browser as a beachhead to launch attacks deep into your network. What was once previously considered a purely theoretical attack technique is now within reach of the reader. This book will demonstrate the techniques of web browser hacking:

Attacking the Browser

Attacking the Web (via the browser)

Attacking the Intranet (via the browser)

Attacking Mobile Devices (via the browser)

Browser Hardening

Wade Alcorn is the Asia Pacific General Manager for NCC Group and was one of the first penetration testers in Australia and is the creator of the BeEF open source browser exploitation framework, among Insecure.org's top 100 security tools. Wade is a founding director of The Council of Registered Ethical Security Testers in Australia and presents at numerous international conferences. Christian Frichot is a founding partner of Asterisk Information Security with a focus on data visualization/data analysis and is one of the developers of BeEF. He is a leader of the Perth Open Web Application Security Project and is a speaker at numerous conferences.

Michele Orrù a.k.a. antisnatchor is a security professional and a frequent speaker at hacking conferences: CONFidence, DeepSec, Hacktivity, SecurityByte, AthCon, HackPra, Semafor, Just4Meeting, OWASP AppSec USA, 44Con, EUSecWest and is a Senior Spider for Trustwave SpiderLabs as well as a guest lecturer at European universities. The lead core developer of the BeEF project, previously he worked for the Royal Bank of Scotland and the National Institute for Nuclear Physics.

Page 12: Wiley Technology Rights Guide FBF 13

12

Graphic & Multimedia

Lisa DaNae Dayley, Brad Dayley

PHOTOSHOP CC BIBLE

Graphics & Design software (Non-Microsoft) • 978-1-118-64369-3

Paper • US$ 49.99 • 1272 • 18.73 x 23.50 cm. • 10/25/2013

The Photoshop CC Bible is the only book you need to succeed in any Photoshop endeavor. It shows readers how to retouch, color correct, manipulate, and combine images using Photoshop CC. Readers will learn to create cutting-edge special effects for their digital or film-based images, and use them on the Web or in print. The easy and approachable writing style demystifies even the most complex Photoshop CC tasks. You'll master every aspect of Photoshop CC -- from image-editing basics to techniques for working with camera raw images. Other topics covered include the File Browser, histogram palette, Lens Blur, Match Color, the color replacement tool, customizable keyboard shortcuts, as well as covering all the new features and enhancements made in the latest version of Photoshop CC.

Lisa DaNae Dayley has a degree in Advertising from Brigham Young University. She has owned and operated a media creation business for 16 years, incorporating writing, graphic design, and video editing over the years. DaNae enjoys teaching PHOP classes locally and after 16 years of working with PHOP is still constantly amazed as the cool stuff it can do! She is the co-author of several books written with her husband Brad Dayley and the author of Photoshop CS3 Extended Video and 3D Bible and Roxio Easy Media Creator 8 in a Snap.

Brad Dayley is a senior software engineer with almost 20 years of experience creating computer applications. He has been working with PHOP for 19 years, enjoying the transition of PHOP from a simple image editor to the powerhouse it is today. He is also the author of the Silverlight 2 Bible and several books. Brad is an avid amateur photographer and spends most of his free time in the remote areas of the western U.S. with his wife DaNae and their four sons.

Lee Ambrosius

AUTOCAD PLATFORM CUSTOMIZATION: USER INTERFACE AND BEYOND

Graphics & Design software (Non-Microsoft) • 978-1-118-79888-1

Paper • US$ 24.99 • 900 • 18.73 x 23.50 cm. • 01/10/2014

AutoCAD Platform Customization is a unique learning resource that teaches readers how to customize and personalize such programs as AutoCAD, AutoCAD LT, Civil 3D, Inventor, Plant 3D, and other programs built on Autodesk’s AutoCAD platform. Written by an Autodesk insider with years of customization experience, the book features detailed discussions backed by real-world examples and tutorials. This e-book features personalization options that offer crucial outcomes such as enforcing drawing and CAD standards, manipulating the drawing environment, automating repetitive tasks, and customizing buttons, ribbons, and palettes on the interface. The book includes an additional resources appendix and features downloadable datasets and customization examples.

Lee Ambrosius (Waukesha, WI) is a Principal Learning Content Developer at Autodesk for AutoCAD and AutoCAD LT products and has worked on the Autodesk API and documentation for six releases. He has presented customization/programming sessions at Autodesk University for eight years, has authored and edited a number of AutoCAD related books , is active in the developer community’s forums, and he blogs at hyperpics.blogs.com and tweets as @leeambrosius.

Page 13: Wiley Technology Rights Guide FBF 13

13

Networking

EMC Education Services

CLOUD INFRASTRUCTURE AND SERVICES: VIRTUALIZATION AND CLOUD INFRASTRUCTURE TECHNOLOGY CONCEPTS AND PRINCIPLES

Networking • 978-1-118-78723-6

Cloth • US$ 60.00 • 544 • 18.73 x 23.50 cm. • 12/20/2013

Cloud Infrastructure and Services educates readers about cloud deployment and service models, cloud infrastructure, and the key considerations in migrating to cloud computing. Using the U.S. National Institute of Standards and Technology as a definitive guide, the book covers technologies required to build classic (traditional), virtualized, and cloud data center environments. These technologies include compute, storage, networking, desktop and application virtualization. Additional areas of focus include business continuity, security, and management.

Readers will learn about the key considerations and steps involved in transitioning from the current state of their data center to a cloud computing environment. Upon completing this book, -readers will have the knowledge to make informed decisions about migrating to cloud infrastructure and choosing the best deployment model for their organization. The book will cover:

Cloud overview, foundations, benefits, trends

Cloud service models, deployment models, brokers, adoption

Compute, network and storage classic and virtual infrastructure & management

Application & Desktop implications & transformation

Cloud availability, security, service creation and service management

EMC employs approximately 60,000 people worldwide with 400 sales offices and scores of partners in 86 countries around the world and R&D centers in Belgium, Brazil, China, France, Ireland, India, Israel, the Netherlands, Russia, Singapore, and the U.S., and manufacturing facilities in the U.S. and Ireland. EMC ranks 152 in the Fortune 500. In 2011, EMC achieved revenue of $20 billion. EMC owns VMWare, Greenplum, RSA security in addition to numerous small companies. In March 2013 EMC and VMware officially launched the Pivotal Initiative, a big data and cloud platform company.

Page 14: Wiley Technology Rights Guide FBF 13

14

Rynardt Spies, Matt Liebowitz, Christopher Kusek

VMWARE VSPHERE PERFORMANCE: SOLVING CPU, MEMORY, STORAGE, AND NETWORKING ISSUES

Operating Systems (General) • 978-1-118-00819-5

Paper • US$ 59.99 • 552 pages • 18.73 x 23.50 cm. • 01/02/2014

Solving performance problems of a computing environment requires an understanding of the interactions between software and hardware. A virtual environment adds new software layers and new types of interactions that must be considered when solving performance problems. VMware vSphere Performance: Solving CPU, Memory, Storage, and Networking Issues helps VMware system administrators and engineers by providing guidance on common CPU, memory, storage, and network-related problems. You will find step-by-step instructions for solving the problems as well as explanation of possible root-causes. You will learn about troubleshooting methodologies, performance monitoring tools, and tools that isolate performance problems. Coverage also includes best practices for designing and virtualizing mission critical applications with VMware vSphere.

Matt Liebowitz is an Advisory Solution Architect with EMC Consulting with a focus on helping customers virtualize business critical applications. He is a published author, blogger, and VMware vExpert who has been working in the field of virtualization since 2002. Matt blogs on virtualization at http://www.thelowercasew.com and can be found on Twitter at @mattliebowitz.

Christopher Kusek is a Technology Visionary and Internet personality known as @cxi on Twitter. A VMware vExpert, he has worked for such enterprise vendors as EMC and NetApp, leading global teams of Virtualization and Cloud professionals. He is currently leading the charge of Virtualization for the war effort in Operation Enduring Freedom in Afghanistan.

Rynardt Spies is a Private Cloud Virtualization and Automation Consultant with one of the largest IT service providers in Europe. He has worked with enterprise x86 virtualization technologies since 2004 and has experience in designing, implementing and managing large vSphere infrastructures. Rynardt maintains a virtualization website, www.virtualvcp.com. He has been named VMware vExpert in 2009, 2010, and 2013.

Page 15: Wiley Technology Rights Guide FBF 13

15

Bruce Dang, Alexandre Gazet, Elias Bachaalany

PRACTICAL REVERSE ENGINEERING: USING X86, X64, ARM, WINDOWS KERNEL, AND REVERSING TOOLS

Networking / Security • 978-1-118-78731-1

Paper • US$ 50.00 • 336 • 18.73 x 23.50 cm. • 01/29/2014

This book provides a systematic approach to reverse engineering. Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides:

Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM (Advanced RISC Machine) is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple’s i-devices run on ARM. This book will be the first book to cover all three.

Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.

The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans/rootkits as examples congruent with real-life scenarios

Hands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Bruce Dang is a senior security development engineering lead at Microsoft working on security technologies in unreleased Microsoft products. Previously he worked on security vulnerabilities reported to Microsoft and was the first to publicly share analytical techniques for targeted attacks with Office documents. He and his team analyzed the famous Stuxnet malware which supposedly attacked the Iranian uranium enrichment process. He has spoken at RSA, BlackHat Vegas, BlackHat Tokyo, Chaos Computer Club, RECON, and many other industry conferences.

Alexandre Gazet is a senior security researcher at QuarksLab. His focus is on reverse engineering, software protection and dynamic binary instrumentation as well as hardened binary analysis and de-obfuscation and low level security and embedded firmware analysis.

Elias Bachaalany is a software security engineer at Microsoft. Prior to joining Microsoft, Elias worked for Hex-Rays Belgium developing various debugger plugins and worked extensively on improving scripting facilities in IDA Pro and developing new features into IDA Python.

Page 16: Wiley Technology Rights Guide FBF 13

16

Andrew Oliviero, Bill Woodward

CABLING: THE COMPLETE GUIDE TO COPPER AND FIBER-OPTIC NETWORKING, 5TH EDITION

Computer Hardware (general) • 978-1-118-80732-3

Paper • US$ 89.99 • 1200 • 18.73 x 23.50 cm. • 03/14/2014

Cabling is crucial to every network. Correct use of cables helps build a reliable, high performance network; wrong use of cables can doom a network to performance problems, outages, and constant troubleshooting. We are currently in the midst of a huge transition from copper cabling to fiber optics for large-scale communications networks. Fiber optics is a technology that uses glass or plastic fibers to transmit data. A fiber optic cable consists of a bundle of glass threads capable of transmitting messages modulated onto light waves, which allow data to be transmitted at the rate of speeds IEEE are currently producing.

Andrew Oliviero is involved in the development of optical fiber cabling standards in TIA, IEC, ISO, and IEEE. He was involved in the development of the ANSI/TIA-568-C standard and has held the Chair position of TIA's Fiber Optic LAN Section in 2007. Andrew holds a B.S.E and Ph.D. in Chemical Engineering from the University of Pennsylvania and the University of Massachusetts. Bill Woodward has served three terms as chairman of the Electronics Technicians Association and is a principal electrical engineer based in Chesapeake, Virginia. Bill is also the committee chairman of the ETA fiber optic installer (FOI), fiber optic technician (FOT), and fiber optic designer (FOD) certification programs.

Photography

J. Dennis Thomas

THE ART AND STYLE OF PRODUCT PHOTOGRAPHY

Digital Cameras & Photography • 978-1-118-72147-6

Paper • US$ 34.99 • 288 pages • 18.73 x 23.34 cm. • 12/20/2013

The quality of a product's photograph is very important to how it is viewed whether it is on-line or in print. Having a high quality image is key in selling your products. Product photography is a skill that can take some time to master. In Product Photography, author J. Dennis Thomas will guide readers through the basics of product photography from selecting the right equipment, practicing different lighting techniques, controlling exposure and using backgrounds, props and more. Product Photography will give new and even experienced photographers the tools and resources needed to further their product photography career.

J. Dennis Thomas is a freelance photographer and author based out of Austin, Texas. He has nearly 25 years of experience behind the lenses of Nikon cameras. His work has been published in many regional and national publications including Rolling Stone, SPIN, Country Weekly, Thrasher, Elle, W Magazine, and US Weekly. His work is syndicated worldwide by Corbis and Associated Press Images. He also works as a freelance photographer for the Austin American Statesman and Austin360.com covering editorial, entertainment, and fashion events.

Page 17: Wiley Technology Rights Guide FBF 13

17

Michele Celentano

NATURAL LIGHT PHOTOGRAPHY

Digital Cameras & Photography • 978-1-118-76780-1

Paper • US$ 34.99 • 320 • 18.73 x 23.34 cm. • 01/24/2014

Natural Light Photography is a guide for photographers who want to learn more about natural, or existing, light photography to successfully capture stunning natural light photography. The book will cover the following in each chapter about light: an overview of the type of light being discussed, learning how to recognize how that lighting will affect photography, learning to effectively use different types of natural light, camera specifications and metering options, as well as plenty of example photographs.

Natural Light Photography will cover using various types of sunlight: direct sun, backlighting, flare, soft light. Also covered will be working with shadows, existing room fixtures (lamps, etc.), working in dark environments such as churches or basements, candles, and other ambient light. With full coverage of color temperatures, white balance, and addressing choosing the proper exposure in any situation, Natural Light Photography will offer readers the guidance they need to successfully capture stunning photographs in any natural light situation.

Michele Celentano After 21 years of experience, Michele's passion for transforming her photography into works of art only continues to grow. Michele was awarded her Craftsmen Degree from the Professional Photographers of America and the Accolade of Photographic Mastery from Wedding and Portrait Photographers International. Her artwork has been published in literary works such as Rangefinder, American Photographer, Shutterbug and Studio Photography. Michele is one of an elite group of photographers to be contracted by Canon USA to represent their company as a spokesperson for the Explorers of Light program. Only 50 photographers nationwide hold this honor. Michele has been featured in numerous advertisements for Canon and their professional line of cameras. In addition to running her portrait business full time, Michele continues to travel internationally to teach and lecture on the subject of professional photography.

Page 18: Wiley Technology Rights Guide FBF 13

18

Programming

Deepak Vohra

BEGINNING JAVA PROGRAMMING: THE OBJECT ORIENTED APPROACH

Object Technologies - Java • 978-1-118-73949-5

Paper • US$ 44.99 • 744 pages • 18.73 x 23.50 cm. • 10/04/2013

Java is one of the world’s most commonly used programming languages. Many of those eager to start learning Java don’t want just the basics, they want to learn how to apply their new knowledge in the workplace. Beginning Java Programming provides readers a serious education on Java so they can apply their new skills in the real world. The book discusses the fundamentals of Java programming language and is based on the latest version and covers using Java to develop applications in a Java IDE, Eclipse IDE.

The book places an emphasis on OOP principles, and is geared for those who want to use Java in an applied environment while learning Java. Each chapter includes sample programs and screenshots at milestone stage.

The book includes:

Object Oriented Programming

Packages and Imports

Statements

Classes

Variables and Java Types

Interfaces

Methods

Arrays

Exceptions

JVM

The book also is ideal industry training and university use.

Deepak Vohra is an Oracle Certified Associate, Sun Certified Java Programmer, and Sun Certified Web Component Developer. Deepak has published in Oracle Magazine, IBM developerWorks, ONJava, Java World, DevSource, WebLogic Developer’s Journal, XML Journal, Java Developer’s Journal, FTPOnline, and devx. Deepak was the technical reviewer for the O’Reilly’s book: WebLogic The Definitive Guide and Manning’s Prototype and Scriptaculous Quickly. Deepak is a Fellow British Computer Society. Deepak has published seven books on web development including JDBC 4.0 and Oracle JDeveloper for J2EE Development, Ajax in Oracle JDeveloper, Processing XML documents with Oracle JDeveloper 11g, Java 7 JAX-WS Web Services, Pro XML Development with Java Technology, EJB 3.0 Database Persistence with Oracle Fusion Middleware 11g, and Java EE Development with Eclipse.

Page 19: Wiley Technology Rights Guide FBF 13

19

Nick Williams

PROFESSIONAL JAVA FOR WEB APPLICATIONS

Object Technologies - Java • 978-1-118-65646-4

Paper • US$ 59.99 • 870 • 18.73 x 23.50 cm. • 01/24/2014

Professional Java for Web Applications is a comprehensive title that developers can read cover-to-cover when building a complex Java application in an enterprise environment, or pick apart into sections when more knowledge about a particular topic is desired.

Starting with an introduction to the Java Enterprise Edition and the basic web application, readers set up a development application server environment, learn about the tools needed during the development process, and explore numerous Java technologies and practices, including: * Application logging * JSR-303 bean validation * JSR-317 Java Persistence API (with Hibernate) * Spring Framework * Spring Security * Custom JSP tag libraries * WebSocket persistent, fully duplex web connections (new to Java EE 7) Each unit explores a new facet of enterprise application development that builds on the previous unit and enables the reader to jump to a particular point of interest or return to a unit in the future. Readers will not only learn about the industry-standard tools and technologies used in enterprise development, but also enjoy an end-to-end guide to build an enterprise Java application from the ground up, and will explore both specific technologies and the programming concepts that they are built upon. The book is ideal for software developers familiar with Java who have been asked to build enterprise Java applications or would like to expand capabilities in Java to cover enterprise Java applications and web applications. Readers need knowledge in Java Standard Edition, the Web, and basic knowledge in HTML, XML, JavaScript, Structured Query Language (SQL) and relational databases.

Nicholas Williams, Senior Software Developer, UL PureSafety, NWTS Java Code, DNSCrawler.com. At UL PureSafety (formerly PureSafety) Nicholas works extensively with Java Standard Edition, Java Enterprise Edition, Spring Framework, Spring Security, and Hibernate. I have also worked with C#, .NET, .NET MVC and BouncyCastle cryptography. He created the Open Source community NWTS Java Code (http://java.nicholaswilliams.net), where he researches and uses Subversion version control, JetBrains TeamCity and YouTrack, Java cryptography (JCE), and the Java Native Interface (JNI). He is active in the Open Source community, contributing bug reports and suggestions/fixes, feature suggestions and code to projects such as Apache Tomcat, Spring Framework and Spring Security. The Nashville Technology Council named him 2010 Software Engineer of the Year for Middle Tennessee. He is a member of the IEEE, the ARRL, and Williamson County ARES.

Page 20: Wiley Technology Rights Guide FBF 13

20

Nigel Poulton

DATA STORAGE NETWORKING: REAL WORLD SKILLS FOR THE COMPTIA STORAGE+ CERTIFICATION AND BEYOND

Misc (other) certifications • 978-1-118-67921-0

Paper • US$ 59.99 • 500 • 18.73 x 23.50 cm. • 02/21/2014

Candidly written with a focus on real-world experience, this book is the ideal guide for those data storage administrators who are in the trenches. Designed to give the reader the insight of a data storage administrator, this book will cover data storage from top to bottom, inside and out. Starting with the basics, right through to advanced topics, advice, and real-world examples, enabling the reader to understand why and how to deliver world-class solutions in real-world environments. The book will focus on designing, implementing, and administering storage for today's evolving organizations, getting under the hood of the technologies that enable performance, resiliency, availability, recoverability and simplicity. The book will also cover how storage fits in to the wider technology environments prevalent in today's cloud era.

In addition, this is an ideal supplement for those looking to earn their Storage+ (SG0-001) certification. Candidates will be able to use this book to learn relevant information about the different testable concepts, as well as full coverage of the exam objectives, including:

Storage components

Connectivity

Storage management

Data protection

Storage performance

Nigel Poulton is a well-known storage blogger and podcaster, known for his love of storage and deep technical knowledge. He has 15 years IT experience, the last 10 working on data storage. He is currently a storage architect for large global financial organization, working in the Global Storage Strategy & Architecture team. Nigel has done just about everything the storage industry has to offer, all the way from changing backup tapes and plugging in cables, to writing complicated design and architecture documents for petabyte scale environments. Nigel has also written numerous white papers and online articles on data storage.

Page 21: Wiley Technology Rights Guide FBF 13

21

Security

Thomas J. Mowbray

CYBERSECURITY: MANAGING SYSTEMS, CONDUCTING TESTING, AND INVESTIGATING INTRUSIONS

Networking / Security • 978-1-118-69711-5

Paper • US$ 60.00 • 336 pages • 18.73 x 23.50 cm. • 10/24/2013

This book is written to comply with the Comprehensive National Cyber Security Initiative #8: Cybersecurity Education, Cyber Network and will serve as a detailed, hands-on guide for anyone who wants to enter the hands-on security profession, including cybersecurity testing, IT testing/development, and system/network administration. It will also serve as the text for a cybersecurity course at 2 and 4 year colleges and vocational cybersecurity education. The book is also a useful reference for working cybersecurity professionals for techniques such as advanced filtering with Wireshark and tcpdump, command line scripting, network penetration, tool customization, network administration, and log analysis.

Cybersecurity covers basic network administration skills that everyone needs through to advanced command line scripting, tool customization, and log analysis skills that are very useful in every shop, but few professionals have. The book goes deeper into wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizations.

In addition to the accompanying course syllabus, PowerPoint slides, and test bank, the ancillaries include downloadable custom scripts for Advanced Log Analysis. The book can be used in tandem with the SEED Project lab exercises at http://www.cis.syr.edu/~wedu/seed/ which are free, open source security labs with a free instructor’s manual. The book’s exercises can be tested using the free version of BackTrack Linux.

Tom Mowbray, Ph.D. is a certified security professional holding gold level certification from the SANS Institute in network penetration, and ethical hacking and is a member of the SANS Advisory Board and the Editorial Board of the Journal of Enterprise Architecture. In addition, he is the founder of the Northrup Grumman Cyber Warfare SIG and the former lab manager and hands-on IT security tester for the Certification and Accreditation Team (CAT Team), an elite team of cyber security experts supporting the US government. Formerly a college professor (Purdue), Tom is currently teaching at the Zachman/FEAC Institute. Tom is the author of previous technology books including a best-seller.

Page 22: Wiley Technology Rights Guide FBF 13

22

Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski

ANDROID HACKER'S HANDBOOK

Networking / Security • 978-1-118-60864-7

Paper • US$ 50.00 • 432 • 18.73 x 23.50 cm. • 11/22/2013

The Android Hacker's Handbook presents the specifics of the Android operating system from a security point of view. It explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It explains how vulnerabilities can be found in, and exploits developed for, various components of the system. There are no other books that come close to covering Android security on this level. The book is written by a group of some of the world’s foremost Android security researchers

The ideal reader for this book would be someone who is interested in understanding the intricacies of the security of the Android ecosystem. This includes both implementation details as well as complexities introduced by the open nature of the OS. The person may be a security researcher, mobile device administrator, or consultant responsible for evaluating the security of the Android OS. Also, this person could be an Android application developer hoping to avoid common security pitfalls.

Joshua J. Drake is a Senior Security Research Scientist with Accuvant LABS. He has been researching Android security since 2009, and providing Android consultation to major OEMs. He has spoken at several industry conferences, such as RSA, BlackHat Toorcon, and DerbyCon. At BlackHat USA 2012, Georg and Joshua demonstrated an exploit for the Android 4.0.1 browser.

Georg Wicherski is a Senior Security Researcher with CrowdStrike, mostly analyzing advanced targeted threats but also putting himself in attackers’ shoes from time to time.

Collin Mulliner is a postdoctoral researcher in the Systems Security Lab at Northeastern University. Collin's main interest is the security and privacy of mobile and embedded systems with an emphasis on mobile and smart phones.

Zach Lanier is a Security Researcher with Veracode, where he specializes in mobile application security and static analysis.

Pau Oliva is a Mobile Security Engineer with viaForensics. He has been actively researching security aspects on the Android operating system since its debut with the T-Mobile G1 on October 2008.

Stephen A. Ridley is a security researcher and formerly Senior Security Architect at McAfee, working for a major defense contractor. He has presented at conferences such as: BlackHat, ReCon,EuSecWest, CanSecWest, Syscan and his work has been covered by NPR, Wired, Washington Post and other publications.

Page 23: Wiley Technology Rights Guide FBF 13

23

Bruce Schneier

CARRY ON: SOUND ADVICE FROM SCHNEIER ON SECURITY

Networking / Security • 978-1-118-79081-6

Paper • US$ 29.99 • 336 • 15.24 x 22.86 cm. • 12/11/2013

Covering the most up-to-date and highly praised of his writings, the author will introduce each of the categories: Crime, Terrorism, Spying, and War~~Human Aspects of Security~~Privacy and Surveillance~~Psychology of Security~~Security and Technology~~Security, Policy, Liberty, and Law~~The Business and Economics of Security~~Travel and Security~~Voting More than 160 articles will include (with more than 25 never published in Schneier's blog):

The Boston Marathon Bombing: Keep Calm and Carry On

The Internet is a Surveillance State

How to Create the Perfect Fake Identity

Chinese Cyberattacks: Myth or Menace

Why Obama Should Keep His Blackberry but Won't

Google and Facebook's Privacy Illusion

Is Aviation Security Mostly for Show?

Fixng a Security Problem Isn't Always the Right Answer

Hacking the Papal Election

Bruce Schneier is an internationally renowned security technologist. Described by The Economist as a "security guru," when people want to know how security really works, they turn to Schneier. His first bestseller, Applied Cryptography, was described by Wired as "the book the National Security Agency wanted never to be published." His book on computer and network security, Secrets and Lies, was called by Fortune "a jewel box of little surprises you can actually use." His latest book, Liars and Outliers, explains how societies use security to enable the trust that they need to survive. Regularly quoted in the media he has testified on security before Congress and has written for many major publications, including The New York Times, The Guardian, Forbes, Wired, Nature, The Bulletin of the Atomic Scientists, The Sydney Morning Herald, The Boston Globe, The San Francisco Chronicle, The Washington Post, and the Atlantic. Schneier also publishes a free monthly newsletter, Crypto-Gram, and a blog, Schneier on Security, with a combined 250,000 readers.

Page 24: Wiley Technology Rights Guide FBF 13

24

Davi Ottenheimer

BIG DATA SECURITY

Networking / Security • 978-1-118-55921-5

Paper • US$ 59.99 • 480 pages • 18.73 x 23.50 cm. • 01/23/2014

This book introduces the reader to security concepts relevant to big data; it presents the architectural considerations and steps necessary for defense. Readers will discover how attacks on big data differ from enterprise and other data models and how to best use technology and processes to defend against attacks. Here are four of the topics covered:

Understanding security risks introduced when handling high Volume, Velocity and Variety of Data

Managing trust relationships between hadoop nodes in racks and clusters

Common mistakes made when trying to secure big data

Advancing technology – following the direction of big data controls and emerging solutions

Davi Ottenheimer, President of flyingpenguin, a security consulting firm and has more than seventeen years' experience managing global security operations. He is a frequent top-rated public speaker: BlackHat’s BSidesLV, headliningGigacom’s Big Data Healthcare Project, BlackHat Dubai and the Gulf Information Security Expo and as keynote a security conference in Copenhagen in October. His writings appear in Compliance Week, Search Security, Bank Info Security, Network World, Red Herring, Chain Store Age, Inc, Reuters and SC Magazine. Formerly Davi was responsible for security at Barclays Global Investors (BGI) and Yahoo responsible for managing security for all digital home products. His clients include Cisco, Department of Defense , IBM, Intel, Puget Sound Energy, State Farm, University of California, University of Iowa, and VMware.

Page 25: Wiley Technology Rights Guide FBF 13

25

Jay Jacobs, Bob Rudis

SECURITY USING DATA ANALYSIS, VISUALIZATION, AND DASHBOARDS

Networking / Security • 978-1-118-79372-5

Paper • US$ 50.00 • 360 • 18.73 x 23.50 cm. • 01/23/2014

Everything in the book will have practical application for information security professionals. The entire purpose of data analysis and visualization is to gather feedback from the environment to make better and more informed technology decisions. Within information security that means identifying ways to prevent or detect breaches and then measuring the effectiveness in doing so, which is all wrapped up under "risk management". All of the examples will be directed at answering real-world questions. One of the key points is not just to analyze what is in front of us, but collect and analyze the data we need to answer the questions that will lead to better decisions and prevention of hacks and vulnerabilities.

The book will present the core elements of analyzing I.T. system data and information security feedback by using 30 use cases and domain-specific data sets with a focus on practical “how-to”. This hands-on approach will be covered in context and will not be limited to just the analysis, but all the supporting skills needed to learn from our data. Data analysis from start to finish: from the data collection and preparation through the data storage and management fundamentals then into the analysis and finally data visualization and communication techniques all in the context of security.

Jay Jacobs is the Sr. Data Analyst on Verizon’s RISK team where he collects, analyzes and visualizes information security data. He is a co-author of the Verizon Data Breach Investigations Report series and is a co-founder of the Society of Information Risk Analysts and currently serves on the organization’s board of directors. He is also one of the primary authors of the OpenPERT project, an open-source Excel plug-in for risk analysis. He is a blogger (securityblog.verizonbusiness.com), and a co-host of the Risk Science podcast. Jay writes frequently on cryptographic key management and risk analysis and speaks regularly on security and data analysis.

Bob Rudis is a 20-year veteran of IT and Security and has consulted in and worked for many of the largest global enterprises. Bob currently directs Enterprise Information Risk Management for Liberty Mutual Insurance. He writes frequently for Security Focus and FedTech Magazine and SANS, and posts regularly to his own blog (rud.is) on technology, data analysis & visualization and information security. He is currently on the Board of Directors for the Society of Information Risk Analysis and has been named one of the Top 25 Influencers in Information Security by Tripwire.

Page 26: Wiley Technology Rights Guide FBF 13

26

Christopher Hadnagy, Dr. Paul Ekman

UNMASKING THE SOCIAL ENGINEER: THE HUMAN ELEMENT OF SECURITY

Networking / Security • 978-1-118-60857-9

Paper • US$ 34.99 • 336 pages • 15.24 x 22.86 cm. • 01/27/2014

Unmasking the Social Engineer: The Human Element of Security digs into nonverbal human communications and how it affects social engineering. This book delves deep into how attacks against companies and individuals use nonverbal communications every day. It explains nonverbal communications and demonstrates with visuals, the connection of non-verbal behavior to social engineering and scamming. The reader will gain the knowledge needed to help protect their organization. The book clearly combines both the practical and technical aspect of the social engineer revealing all the various dirty tricks that scammers use as well as pinpoints what to look for on the nonverbal side to detect the social engineer.

What is nonverbal communication?

What is Social Engineering?

Understanding the Language of the Hands

Science Behind the Torso, Legs and Feet

The Science Behind the Face - Understanding the 7 base emotions and how they are displayed

The Limbic System and social Engineering

The Moral Molecule - Trust and the Social Engineer

The Power of Empathy in Social Engineering

Using Nonverbals as a Social Engineer

Chris Hadnagy is a worldwide consultant on the "human" aspect of security technology: social engineering. He provides training to the Fortune 500 (Sony, LockHeed Martin, etc.) analyzing malicious attacks by social engineers/hackers and then provides step-by-step prevention techniques. Chris is a frequest speaker at RSA and major security conferences and is the author of Wiley’s best-selling book, Social Engineering: The Art of Human Hacking.

Dr. Paul Ekman is a pioneer in the study of nonverbal behavior. He was among TIME Magazine’s Top 100 most influential people in 2009. His work has been covered in Time, Smithsonian Magazine, Psychology Today, The New Yorker, New York Times, and the Washington Post. He has appeared on 48 Hours, Dateline, Good Morning America, 20/20, Larry King, Oprah, News Hour with Jim Lehrer, and Bill Moyers’ The Truth About Lying.

Page 27: Wiley Technology Rights Guide FBF 13

27

Index

Abbott, 8 Acing the Java Programming Interview, 9 Alcorn, 10 Ambrosius, 11 Android Hacker's Handbook, 18 Applied Predictive Analytics: Principles and

Techniques for the Professional Data Analyst, 8

AutoCAD Platform Customization: User Interface and Beyond, 11

Bachaalany, 13 Beginning Java Programming: The Object

Oriented Approach, 15 Big Data Security, 20 Big Data: Understanding How Data Powers Big

Business, 5 Cabling Part 1: LAN Networks and Cabling

Systems, 5th Edition, 14 Cabling Part 2: Fiber-Optic Cabling and

Components, 5th Edition, 14 Cabling: The Complete Guide to Copper and

Fiber-Optic Networking, 5th Edition, 14 Carry On: Sound Advice from Schneier on

Security, 19 Celentano, 15 Cloud Infrastructure and Services: Virtualization

and Cloud Infrastructure Technology Concepts and Principles, 12

Couzin, 6 Cybersecurity: Managing Systems, Conducting

Testing, and Investigating Intrusions, 18 DaNae Dayley, 11 Dang, 13 Data Storage Networking: Real World Skills for

the CompTIA Storage+ Certification and Beyond, 17

Dayley, 11 Drake, 18 Ekman, 21 EMC Education Services, 12 Five Stars: Putting Online Reviews to Work for

Your Business, 6 Frichot, 10 Gazet, 13 Gomzin, 8 Grappone, 6 Hacking Point of Sale: Payment Application

Secrets, Threats, and Solutions, 8 Hadnagy, 21 Hart-Davis, 4 Hsu, 7 Jacobs, 20

John, 7 Jorgensen, 6 Kusek, 12 Lanier, 18 Liebowitz, 12 Marketing Analytics: Data-Driven Techniques

with Microsoft Excel, 5 Markham, 9 McFedries, 4 Microsoft Big Data Solutions, 6 Mitchell, 6 Mowbray, 18 Mulliner, 18 Natural Light Photography, 15 Oliva, 18 Oliviero, 14 oodward, 14 Orru, 10 Ottenheimer, 20 Poulton, 17 Practical Reverse Engineering: Using x86, x64,

ARM, Windows Kernel, and Reversing Tools, 13

Price, 6 Professional Java for Web Applications, 16 Programmer's Bootcamp: Improve your Skills,

Land a Job, 7 Ridley, 18 Rowland-Jones, 6 Rudis, 20 Schmarzo, 5 Schneier, 19 Security Using Data Analysis, Visualization, and

Dashboards, 20 Spies, 12 Teach Yourself VISUALLY Complete Mac Pro, 4 Teach Yourself VISUALLY MacBook Air, 4 Teach Yourself VISUALLY Raspberry PI, 7 The Art and Style of Product Photography, 14 The Browser Hacker's Handbook, 10 Thomas, 14 Unmasking the Social Engineer: The Human

Element of Security, 21 VMware vSphere Performance: Solving CPU,

Memory, Storage, and Networking Issues, 12 Vohra, 15 Welch, 6 Wentk, 7 Wicherski, 18 Williams, 16 Winston, 5