 |
|
|
 Breakthrough Discoveries in Information Technology Research: Advancing Trends
This collection, entitled Breakthrough Discoveries in Information Technology Research: Advancing Trends , aims to inform researchers and practitioners of novel and emerging research in information science and technology, allowing for the discussion and dissemination of critical concepts that will promote further study and innovation.... |  |  Epidemiology: A Very Short Introduction (Very Short Introductions)
Epidemiology plays an all-important role in many areas of medicine, from discovering the relationship between tobacco smoking and lung cancer, to documenting the impact of diet, the environment, and exercise on general health, to tracking the origin and spread of new epidemics such as Swine Flu. It is truly a vital field, central to the... |  |  Deploying Microsoft Forefront Threat Management Gateway 2010
When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,... |
|
 Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
 Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
This book is about expanding Internet business risk management strategies
into resilience such as software diversity; into financial risk transfer instruments
such as insurance policies, catastrophe bonds, performance bonds, and
self-insurance as in Basel II; and into reputation systems.
Traditional Internet performance and... |  |  Secure Coding in C and C++
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append... |
|
| Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |