Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Architecture: An Integrated Approach to Security in the Organization
Information Security Architecture: An Integrated Approach to Security in the Organization

This book is dedicated to my husband, Todd A. Tudor, and my three children, Drew, Allyssa, and Chad, who spent many hours patiently waiting for my time and attention while this book was being written.

Profits from this book will be contributed to the children of the world through the YMCA in Ethiopia, Africa, and through The...

Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)
Analysis for Computer Scientists: Foundations, Methods, and Algorithms (Undergraduate Topics in Computer Science)

Mathematics and mathematical modelling are of central importance in computer science. For this reason the teaching concepts of mathematics in computer science have to be constantly reconsidered, and the choice of material and the motivation have to be adapted. This applies in particular to mathematical analysis, whose significance has to be...

Picture Yourself Learning Microsoft Word 2010
Picture Yourself Learning Microsoft Word 2010

Welcome to the world of Microsoft Word 2010. This new Picture Yourself book from Cengage Learning will help you use the many and varied features of one of Microsoft’s most popular products—Microsoft Word, part of the Microsoft Office Suite. Microsoft Word 2010 is a powerful word processing program that will take your...

Flash MX Games: ActionScript for Artists
Flash MX Games: ActionScript for Artists

Flash MX provides the perfect platform to create fun games for Internet distribution. This book takes the reader through the entire process from creating the art and animation for these games, through to programming them ready for users across the world to enjoy the results. The book is split into four sections. The first section...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Communicating Systems & Networks: Traffic & Performance (Innovative Technology Series)
Communicating Systems & Networks: Traffic & Performance (Innovative Technology Series)

This book originates from the desire to perpetuate expertise in the field of performance evaluation, particularly for telecommunication systems and networks. It is obviously impossible to translate into a single work all the facets of an activity which encompasses many systems and a great variety of domains such as standardization,...

Java 2: The Complete Reference, Fifth Edition
Java 2: The Complete Reference, Fifth Edition

The past few years document the following fact: The Web has irrevocably recast the face of computing and programmers unwilling to master its environment will be left behind.

The preceding is a strong statement. It is also true. More and more, applications must interface to the Web. It no longer matters much what the...

Java Programming
Java Programming

Java Programming, Fifth Edition provides the beginning programmer with a guide to developing applications using the Java programming language. Java is popular among professional programmers because it can be used to build visually interesting graphical user interface (GUI) and Web-based applications. Java also provides an excellent...

Nagios: System and Network Monitoring
Nagios: System and Network Monitoring

Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd...

Mastering IBM i: The Complete Resource for Today's IBM i System
Mastering IBM i: The Complete Resource for Today's IBM i System

The IBM i operating system running on IBM Power Systems is a platform in transition. Many think the system is obsolete, largely due to its infamous green screen. Nothing, though, could be further from the truth. When IBM embraced open-source software such as Linux, MySQL, and Zend PHP, the system cemented a formidable position in...

Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)
Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)

This book on the Twitter API is geared to the programmer who is just a bit past beginner—who knows the basics of LAMP, including how to set up a basic server, PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to use this book, but you should know how to look things up. In writing this book, we have tried...

The Chief Information Security Officer
The Chief Information Security Officer

The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...

  • Learn how the role...
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy