Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security Management Handbook, Fourth Edition, Volume II
Information Security Management Handbook, Fourth Edition, Volume II
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Information Security Management Handbook, Fourth Edition, Volume III
Information Security Management Handbook, Fourth Edition, Volume III
A wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent.
- Technical Support, Dec. 2004

This is a must-have book for those preparing for the CISSP exam and for any information security professional.
- Zentralblatt MATH 1054, May 2005
...
Leading IT Projects: The IT Manager's Guide
Leading IT Projects: The IT Manager's Guide
Senior level IT managers are responsible for a wide variety of development projects. For the most part, these individual projects are handled by project managers. However, IT managers must be conversant in the field of project management. Additionally, they must understand the dynamics of managing the project manager and be familiar with the skill...
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
Enterprise Systems Backup and Recovery: A Corporate Insurance Policy
This volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information...
VMware ESX Essentials in the Virtual Data Center
VMware ESX Essentials in the Virtual Data Center
The VMware ESX server is vital to virtualization methods used to perform server consolidation, software development, test automation, legacy Windows migration, and more. Server virtualization can drastically cut business costs, and considering that there are few experts in the field, VMware ESX Essentials in the Virtual Data...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Security Software Development: Assessing and Managing Security Risks
Security Software Development: Assessing and Managing Security Risks
Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development...
Essential Software Testing: A Use-Case Approach
Essential Software Testing: A Use-Case Approach
Much has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Practical Network Design Techniques: A Complete Guide For WANs and LANs, Second Edition
Focusing on the scientific aspect of network design, Practical Network Design Techniques uses mathematical models to illustrate important networking concepts and show how to solve many common design problems. Taking an inclusive approach, the author examines the cost and performance issues that can also be used by network analysts and designers as...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy