Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

The ABCs of LDAP
The ABCs of LDAP
This book delivers the theoretical background needed to understand how directory servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP environments.

With the enormous expansion of the World Wide Web over the past decade, internetworking has become widely diffused. Nearly...

Agile Strategy Management: Techniques for Continuous Alignment and Improvement (ESI International Project Management Series)
Agile Strategy Management: Techniques for Continuous Alignment and Improvement (ESI International Project Management Series)

Your strategic initiatives are constantly under fire due to the evolving nature of markets, technology, laws, and government. To ensure your strategy succeeds, it must remain flexible while confronting these shifting challenges. Agile Strategy Management: Techniques for Continuous Alignment and Improvement explains how to achieve this...

How to Develop and Implement a Security Master Plan
How to Develop and Implement a Security Master Plan
Written for corporation security officers, this work is designed to help them garner executive support and increased funding for their security programs.  It provides a thorough understanding of the Security Master Planning process, explaining how to develop appropriate risk mitigation strategies, and how to focus on both effectiveness and...
Solar Cell Technology and Applications
Solar Cell Technology and Applications

Energy experts predict that wholesale electricity prices could easily rise 35 to 65 percent by 2015. Add to this the growing need for energy independence and the need to reduce carbon emissions and it is very clear that the development of low-cost renewable energy, such as solar energy, is essential for our economy and our national security....

Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Practical Project Management for Building and Construction (ESI International Project Management Series)
Practical Project Management for Building and Construction (ESI International Project Management Series)

Practical Project Management for Building and Construction covers the 14 knowledge areas of project management that are essential for successful projects in the construction industry. For each knowledge area, it explains the processes for scope, time, risk, cost, and resource management. Filled with work and process flow...

WiMAX / MobileFi: Advanced Research and Technology
WiMAX / MobileFi: Advanced Research and Technology
WiMAX is bringing about a worldwide revolution in broadband wireless access, including both fixed and mobile handsets. The IEEE 802.16 working group standardized most aspects of WiMAX signaling messages. However, several algorithms were left unspecified opening the door for innovations in protocol engineering for 802.16/802.20-based broadband...
Antipatterns: Managing Software Organizations and People, Second Edition (Applied Software Engineering Series)
Antipatterns: Managing Software Organizations and People, Second Edition (Applied Software Engineering Series)

Emphasizing leadership principles and practices, Antipatterns: Managing Software Organizations and People, Second Edition catalogs 49 business practices that are often precursors to failure. This updated edition of a bestseller not only illustrates bad management approaches, but also covers the bad work environments and...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy