Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...
This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from...
“People in all demographics and regions of the world are more connected than ever before to the products, issues, places, and individuals in their lives. This book recognizes that we’ve come to a place where people can represent their real identity--both personal and professional--and use the social filters...
“The New World of Wireless is an impressive, thoughtful journey that helps business leaders see over the horizon to our unwired future, where we belong.”
–John Chen, Chairman, CEO, and President, Sybase, Inc.
“The author’s option trading guidelines include important issues often overlooked by investors. Attention conservative investors! Michael C. Thomsett’s Options Trading for the Conservative Investor has hit a bull’s-eye...for you!”
“Sir John’s ability to comprehend complex concepts and distill these into money-making ideas for his investors was legendary. With this book, Scott Phillips extends Sir John Templeton’s crystal clear vision to some of tomorrow’s most interesting and powerful money-making opportunities. All readers...
A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the...
Well-known security experts decipher the most challenging aspect of cloud computing-security
Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...
Internet Crimes, Torts and Scams: Investigation and Remedies helps attorneys understand the increasing range of illegal and malicious internet activity and a similarly expanding number of response or enforcement options. Reflecting a "real-world" dynamic, the book is problem-oriented and cuts across many practice areas including...
Growth in the information and technology (ICT) sector has exploded over the past 20 years. Dynamic market and technology developments have led to a phenomenon known as convergence, defined in this volume as the erosion of boundaries between previously separate ICT services, networks, and business practices. Examples include cable television...