Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Strategic Information Security
Strategic Information Security

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....

Software Engineering Reviews and Audits
Software Engineering Reviews and Audits

I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in...

Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis

Audit and Trace Log Management: Consolidation and Analysis is both a timely and much needed compilation of useful information around a topic that is becoming more and more critical to not only IT professionals and security practitioners, but to many other departments, such as legal, risk, and compliance, as well as auditors and...

Implementing and Developing Cloud Computing Applications
Implementing and Developing Cloud Computing Applications

I was first exposed to what would become the Internet way back in 1969, while I was still an undergraduate at Brandeis University working on ARPANet, the forerunner to the present Internet, which operated at the then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see http://www.computerhistory.org/internet_history/). I...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications)

Recent advances in digital communications and storage technologies have brought major changes for consumers. High-capacity hard disks and DVDs can store large amounts of audiovisual data. In addition, faster Internet connection speeds and the emerging high bitrate DSL connections provide sufficient bandwidth for entertainment...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy