 |
|
 Software Engineering Reviews and Audits
I have worked in systems engineering, software development, software configuration management, software testing, and software quality assurance organizations for more than 30 years. My experience in these selected fields has been somewhat different from that of most people. I always wanted to experience the software disciplines required in... |  |  Audit and Trace Log Management: Consolidation and Analysis
Audit and Trace Log Management: Consolidation and Analysis
is both a timely and much needed compilation of useful information around a topic
that is becoming more and more critical to not only IT professionals and
security practitioners, but to many other departments, such as legal, risk,
and compliance, as well as auditors and... |  |  Implementing and Developing Cloud Computing Applications
I was first exposed to what would become the Internet way back in 1969,
while I was still an undergraduate at Brandeis University working on
ARPANet, the forerunner to the present Internet, which operated at the
then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see
http://www.computerhistory.org/internet_history/). I... |
|
 Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Information security has become a critical component in the stability and progress
of the modern world. With high expectations from the public and stringent regulations
from legislative and industry bodies, never have the pressures on corporations,
governments and other organizations been so great to protect their own data as well
as... |  |  Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is... |  |  Security Strategy: From Requirements to Reality
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and... |
|
|
 Cloud and Virtual Data Storage Networking
Since I wrote The Green and Virtual Data Center (CRC Press, 2009), I have had the
opportunity to meet and speak with thousands of information technology (IT) professionals
around the world, both in person and virtually via different venues. Even as
that last book was being printed, the ideas to be found in this new book were coming... |  |  |  |  |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |