This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
As auditing shifts from an outsourced function to a cornerstone of internal control, audit directors need an updated manual that reflects the radical changes the internal audit profession recently experienced in order to establish efficient processes for conducting successful audits. Managing the Audit Function, Third Edition, provides...
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...
Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...
Database solutions are integral to every organization that needs to store, analyze, and report on data. Microsoft SQL Server 2005 provides a robust platform for implementing your database solution. SQL Server 2005 is packed with easy-to-use features that make it an ideal environment. In particular, this latest version of SQL...
Compensation fairness is a universal preoccupation in today’s workplace, from whispers around the water cooler to kabuki in the C-suite. Gender discrimination takes center stage in discussions of internal pay equity, but many other protected characteristics may be invoked as grounds for alleging discrimination: age, race, disability,...
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.
Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...
Digital Asset Management: Content Architectures, Project Management, and Creating Order out of Media Chaos is for those who are planning a digital asset management system or interested in becoming digital asset managers. This book explains both the purpose of digital asset management systems and why an organization...
Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...
Practical Firewalls enables you to get a thorough understanding of all of the basic concepts involved in creating and maintaining a firewall. Aimed at beginning to intermediate network administrators, this book presents information in a manner so that you do not need a large background in the networking field. It provides "real world"...
This up-to-the-minute supplement to System Center Operations Manager 2007 Unleashed brings together practical, in-depth information about System Operations Manager 2007, including major enhancements introduced with the R2 release, as well as essential information on other products and technologies OpsMgr integrates...
For the past ten years, O'Reilly's Oracle PL/SQL Programming has been the bestselling book on PL/SQL, Oracle's powerful procedural language. Packed with examples and helpful recommendations, the book has helped everyone--from novices to experienced developers, and from Oracle Forms developers...