Home | Amazing | Today | Tags | Publishers | Years | Search 
The Method Framework for Engineering System Architectures
The Method Framework for Engineering System Architectures
One of the biggest sources of pain in system development is “system integration and test.” This is frequently where projects sailing along with all-green progress reports and Earned Value Management System status summaries start to see these indicators increasingly turn to yellow and then to red. Projects that were thought to be 80...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age
Touches all the bases you need to build a secure enterprise. Drawing on the experience of the world-class METASeS consulting team in building and advising on security programs, this guide shows you how to create a workable security program to protect your organization's internet risk. Softcover.

This report from METASeS is written for
...
VMware Certified Professional Test Prep
VMware Certified Professional Test Prep
Written by VM-certified instructors with years of professional and teaching experience, VMware Certified Professional Test Prep is the ultimate guide to the VCP exam. Its organized and highly practical approach will help administrators successfully complete the exam while also maximizing their ability to apply this tool on the job....
Culture of Human Stem Cells (Culture of Specialized Cells)
Culture of Human Stem Cells (Culture of Specialized Cells)
The first book to collect the most effective and cutting-edge methods and protocols for deriving and culturing human embryonic and adult stem cells—in one handy resource

This groundbreaking new book follows the tradition of previous books in the Culture of Specialized Cells series—each methods and protocols chapter is laid out...

Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
Network Design for IP Convergence
Network Design for IP Convergence
A Comprehensive “Global” Vision of Convergence

The emergence of quality-of-service (QoS) mechanisms continues to propel the development of real-time multimedia services such as VoIP and videoconferencing. However, there remain many challenges to achieving optimized standardization convergence.

...
HOWTO Secure and Audit Oracle 10g and 11g
HOWTO Secure and Audit Oracle 10g and 11g
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that...
Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Wireless Quality of Service: Techniques, Standards, and Applications (Wireless Networks and Mobile Communications)
Focusing on an important and complicated topic in wireless network design, Wireless Quality of Service: Techniques, Standards, and Applications systematically addresses the quality-of-service (QoS) issues found in many types of popular wireless networks.

In each chapter, the book presents numerous QoS challenges encountered in...

Process Improvement with CMMI® v1.2 and ISO Standards
Process Improvement with CMMI® v1.2 and ISO Standards
In this age of globalization, process improvement practitioners must be able to comprehend and work with the different standards and frameworks used around the world. While many systems and software engineering organizations rely on a single standard as the primary driver of process improvement efforts (CMMI®-based process improvement in the...
Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy