|
|
Strategic Information Security
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies.... | | Software Engineering Reviews and Audits
I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in... | | Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and... |
|
Implementing and Developing Cloud Computing Applications
I was first exposed to what would become the Internet way back in 1969,
while I was still an undergraduate at Brandeis University working on
ARPANet, the forerunner to the present Internet, which operated at the
then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see
http://www.computerhistory.org/internet_history/). I... | | Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as... | | Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is... |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |