Complete Guide to CISM Certification
Complete Guide to CISMÐ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...
Security in an IPv6 Environment As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... Networking Explained, Second Edition Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
- Wireless networks
- Convergence of voice and data
Hack I.T.: Security Through Penetration Testing Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
|Result Page: 3 2 1 |