|
|
|
|
Sarbanes-Oxley IT Compliance Using COBIT and Open Source ToolsA Toolkit for IT Professionals
Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up... | | | | Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).
FAST aims to foster cooperation among... |
|
Data Protection and Information Lifecycle Management
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In... | | Human Genome Epidemiology, 2nd Edition
The first edition of Human Genome Epidemiology, published in 2004, discussed how the epidemiologic approach provides an important scientific foundation for studying the continuum from gene discovery to the development, applications and evaluation of human genome information in improving health and preventing disease. Since that time,... | | Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and... |
|
| | Apache CloudStack Cloud Computing
Setting up a cloud computing service, whether for yourself or a customer, is greatly simplified by this step-by-step guide to Cloudstack – the world’s leading open source platform. It’s all here, from installing to extending.
Overview
-
Install, deploy, and manage a cloud service using...
| | Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... |
|
|
|
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 |