|
|
|
|
|
Critical Incident ManagementThis text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.
Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they... | | Digital Privacy: Theory, Technologies, and PracticesDuring recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy:... | | Manage Software Testing…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities. -Software Testing,... |
|
|
Design and Implementation of Data Mining ToolsFocusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the... | | Information Security Management Handbook, Fifth EditionSince 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated... | | Antipatterns: Identification, Refactoring, and ManagementAntiPatterns: Identification, Refactoring, and Management catalogs 48 bad management practices and environments common to software development, IT, and other organizations. The authors cover antipatterns of management, along with environmental/cultural antipatterns and personality antipatterns/phenotypes. Through the classification of these harmful... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |