|
|
|
| | Information Technology Control and Audit, Third EditionThe book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld. — Information Systems Control Journal
Now in its third edition, this book is an excellent introductory... | | |
|
Process Improvement with CMMI® v1.2 and ISO StandardsIn this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. While many systems and software engineering organizations rely on a single standard as the primary driver of process improvement efforts (CMMI®-based process improvement in the... | | Security in an IPv6 EnvironmentAs the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... | | Architecting Software Intensive Systems: A Practitioners GuideToday our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct... |
|
| | The Method Framework for Engineering System ArchitecturesOne of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80... | | HOWTO Secure and Audit Oracle 10g and 11gThis guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that... |
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |