|
|
|
|
Building A Global Information Assurance ProgramGovernments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are... | | Software Project Management: A Process-Driven Approach
To build reliable, industry-applicable software products, large-scale software project groups must continuously improve software engineering processes to increase product quality, facilitate cost reductions, and adhere to tight schedules. Emphasizing the critical components of successful large-scale software projects, Software Project... | | Securing and Controlling Cisco RoutersSecuring and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite, and the subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting... |
|
|
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... | | The Edges of Fiction
What distinguishes fiction from ordinary experience is not a lack of reality but a surfeit of rationality – this was the thesis of Aristotle’s Poetics. The rationality of fiction is that appearances are inverted. Fiction overturns the ordinary course of events that occur one after the other, aiming to show how... | | Information Security Management Handbook, Sixth Edition (Isc2 Press)A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion... |
|
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |