Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
Recent advances in digital communications and storage technologies
have brought major changes for consumers. High-capacity hard disks
and DVDs can store large amounts of audiovisual data. In addition, faster
Internet connection speeds and the emerging high bitrate DSL connections
provide sufficient bandwidth for entertainment...
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to...
Thousands of small companies and nonprofit organizations turn to QuickBooks to keep their finances on track. And over the years, Intuit has introduced various editions of the program to satisfy the needs of different types of companies. Back when milk was simply milk, you either used QuickBooks or you didn’t. But now, when you...
To tackle the complex problems of life today, we need to coordinate a wide range of expertise. Systems concepts and methods offer the means of integrating the contributions of specialists, including managers, scientists and engineers. The book introduces simple yet sound concepts and a language understandable to all concerned. Its methods of...
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights
Marc Andreesen once said that "markets that don't exist don't care how smart you are." Whether you're a startup founder trying to disrupt an industry, or an intrapreneur trying to provoke change from within, your biggest risk is building something nobody wants.
As an industry, interactive is different. The work entails elements of software development, marketing, and advertising, yet it’s neither purely technical nor traditional “agency” work. Delivery methods are different, and because the industry is relatively new, the gap in understanding between the clients buying the work and...
The motivation behind the conception of this monograph was to advance scientific knowledge about the design and control of workflow processes. A workflow pr- ess (or workflow for short) is a specific type of business process, a way of or- nizing work and resources. Workflows are commonly found within large admin- trative organizations such as...
This important new book explores the relationship between top management consultant teams and their clients. Through a series of case studies, from both the private and public sectors, it presents best practice in consulting at the sharp end of contemporary management across all disciplines including change management, business strategy,...
Extensively revised for the latest Java (J2SE 5.0) release; Deitel Java How to Program, 6/e now includes earlier coverage of objects; new and streamlined case studies; and OPTIONAL GUI and graphics sections. Now available in a briefer version (ch. 1-10) called Small Java. SafariX version available.