Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

The ABCs of IP Addressing
The ABCs of IP Addressing
Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to...
Interpreting the CMMI: A Process Improvement Approach
Interpreting the CMMI: A Process Improvement Approach

Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMMI models. Kulpa and Johnson describe the...

The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition (Esi International Project Management Series)
The Complete Project Management Office Handbook, Second Edition identifies the PMO as the essential business integrator of the people, processes, and tools that manage or influence project performance. This book details how the PMO applies professional project management practices and successfully integrates business interests with...
Service-Oriented Architecture: SOA  Strategy, Methodology, and Technology
Service-Oriented Architecture: SOA Strategy, Methodology, and Technology
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Service-Oriented Architecture (SOA): Strategy, Methodology, and Technology guides you through the challenges of deploying SOA. It demonstrates conclusively that...
Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

Software Testing as a Service
Software Testing as a Service

In today’s unforgiving business environment where customers demand zero defect software at lower costs—it is testing that provides the opportunity for software companies to separate themselves from the competition. Providing a fresh perspective on this increasingly important function, Software Testing as a Service...

Practical Hacking Techniques and Countermeasures
Practical Hacking Techniques and Countermeasures
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.

It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to
...
TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Applied Software Risk Management: A Guide for Software Project Managers
Applied Software Risk Management: A Guide for Software Project Managers
Few software projects are completed on time, on budget, and to their original specification. Research supports that projects usually fail due to management, rather than technical, mistakes. Focusing on what practitioners need to know about risk in the pursuit of delivering software projects, Applied Software Risk Management: A Guide for Software...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy