|
|
|
Wireless Internet Handbook: Technologies, Standards, and ApplicationsWireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next... | | Interpreting the CMMI: A Process Improvement ApproachWritten by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMMI models. Kulpa and Johnson describe the... | | The Laws of Software ProcessWithin one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has. Software development now needs to mature into a... |
|
|
Network Perimeter Security: Building Defense In-DepthThis comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec... | | Wireless Security HandbookThis book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this... | | Critical Incident ManagementThis text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.
Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they... |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 |