This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...
Storage technologies have fundamentally changed the landscape
of digital media in a profound way. Gone are the days of using
a single hard disk drive on a workstation as the sole means to
store digital content. Nearly vanished is the practice of capturing
video and audio only on videotape. The practice of transferring
videotape...
In this third edition of Managing Projects in Organizations, J. Davidson Frame updates and expands on his classic book to provide an accessible introduction to the field of project management. Drawing on more than twenty-five years of consulting and training experience, Frame’s most current edition of...
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...
An essential resource on the future of IP networks
Everyone agrees that Internet Protocol (IP) has played and will play a major role in the evolution of networks and services. The exact nature and scope of that role, however, remains a point of discussion. Assembling the foremost experts in their respective fields, editors Salah...
Do you have some experience and a reasonable knowledge of C++ and want to write your own computer games? Have you ever looked at a PC or Playstation (R) game with characters running and leaping through an exciting landscape and wondered how it was done? If so then this book will give you all the information you need to achieve this goal, whether...
CMMI® (Capability Maturity Model® Integration) is an integrated, extensible framework for improving process capability and quality across an organization. It has become a cornerstone in the implementation of continuous improvement for both industry and governments around the world. Rich in both detail and guidance for a wide set of...
Are you ready to extend the capabilities of Visual Studio to become more efficient and productive? Whether you want to integrate optimized builds, enhanced programming tools, or other rapid application development features, this unique resource shows you how to develop customized...
Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications.
Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...
Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.
Overview
Install, deploy, and manage a cloud service using...
A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure
Key Features
Advanced exploitation techniques to breach modern operating systems and complex network devices