|
|
Information Security Management Handbook, Fourth Edition, Volume IIA wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent. - Technical Support, Dec. 2004 This is a must-have book for those preparing for the CISSP exam and for any information security professional. - Zentralblatt MATH 1054, May 2005... | | Information Security Management Handbook, Fourth Edition, Volume IIIA wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent. - Technical Support, Dec. 2004
This is a must-have book for those preparing for the CISSP exam and for any information security professional. - Zentralblatt MATH 1054, May 2005... | | Leading IT Projects: The IT Manager's GuideSenior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill... |
|
Enterprise Systems Backup and Recovery: A Corporate Insurance PolicyThis volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information... | | VMware ESX Essentials in the Virtual Data CenterThe VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data... | | |
|
TCP/IP Professional Reference GuideThe TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP... | | Security Software Development: Assessing and Managing Security RisksExamining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development... | | Essential Software Testing: A Use-Case ApproachMuch has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case... |
|
Architecting Secure Software SystemsThrough the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they... | | Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... | | |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |