Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Software Project Management: A Process-Driven Approach
Software Project Management: A Process-Driven Approach

To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project...

Securing and Controlling Cisco Routers
Securing and Controlling Cisco Routers

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting...

The Laws of Software Process
The Laws of Software Process

Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has. Software development now needs to mature into a...

The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
The Business Value of IT: Managing Risks, Optimizing Performance and Measuring Results
As consultants for the David Consulting Group and in our earlier careers, we have been involved with IT for at least 25 years. During that time, we have been involved in many successful projects and have been confronted by many challenges.

Our collective experiences have culminated in a certain amount of “professional
...
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
Originally designed to sabotage or annihilate websites, computerized “Bots” are increasingly used in mass spamming events, fraud, extortion, identity theft, and software theft. Focusing on the malicious use of bots and bot herder means and motivations, Malicious Bots provides a much needed a resource for understanding...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
The Edges of Fiction
The Edges of Fiction

What distinguishes fiction from ordinary experience is not a lack of reality but a surfeit of rationality – this was the thesis of Aristotle’s Poetics.  The rationality of fiction is that appearances are inverted.  Fiction overturns the ordinary course of events that occur one after the other, aiming to show how...

Information Security Management Handbook, Sixth Edition (Isc2 Press)
Information Security Management Handbook, Sixth Edition (Isc2 Press)
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion...
Patterns for Performance and Operability: Building and Testing Enterprise Software
Patterns for Performance and Operability: Building and Testing Enterprise Software
Structured to follow the software life cycle, Patterns for Performance and Operability provides advice and examples-based instructions at every phase. You can read it from start to finish or go directly to those chapters that interest you the most. Whatever approach you choose, you will learn:

How to:

·...

Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the SSCP CBK, Second Edition ((ISC)2 Press)

Information security has become a critical component in the stability and progress of the modern world. With high expectations from the public and stringent regulations from legislative and industry bodies, never have the pressures on corporations, governments and other organizations been so great to protect their own data as well as...

Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy