Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Official (ISC)2 Guide to the CISSP CBK
Official (ISC)2 Guide to the CISSP CBK
The Official (ISC)² Guide to the CISSP CBK is ideal not only for information security professionals attempting to achieve CISSP certification but also for those who are trying to decide which, if any, certification to pursue. Executives and organizational managers who want a more complete understanding of all the elements that are required in...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Data Scheduling and Transmission Strategies in Asymmetric Telecommunication Environments
Recent advancement and increased growth in Web technologies have resulted in an even greater need for more efficient scheduling and data transmission strategies. An increased reliance on wireless communications devices, with their constraint issues, has further complicated the problem. While both push and pull strategies provide certain solutions,...
Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

This is a comprehensive, highly usable, and clearly organized field manual of the issues, tools, and control techniques that audit, law enforcement, and infosecurity professionals need to know to successfully investigate illegal activities perpetrated through the use of information technology. All of the forensic audit routines discussed...

The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
The Hands-On Project Office: Guaranteeing ROI and On-Time Delivery
This text offers processes, techniques, and tools that IT managers can use to immediately improve the delivery of IT products and services.

Economic pressures have forced IT executives to demonstrate the immediate and calculable ROI of new technology deployments. Unfortunately, existing IT service delivery often drifts without serious...

The HIPAA Program Reference Handbook
The HIPAA Program Reference Handbook
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
Embedded Linux System Design and Development
Embedded Linux System Design and Development

Embedded Linux System Design and Development contains a full development roadmap for embedded Linux systems. It facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux. This book delivers practical solutions for writing, debugging, and profiling...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy