 |
|
|
|
 Managing and Securing a Cisco SWANWireless networking is all about freedom. Freedom is a worthy goal in its own right, and freedom in an organizational context pays dividends.
It’s tremendously cool to be able to sit down in an office or conference room, open your portable computer, and have instant connectivity to the resources you need to do your job.With... |  |  Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |  |  Software Piracy ExposedThis book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software... |
|
|
Result Page: Previous 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 3021 3022 3023 3024 3025 3026 3027 3028 Next |