When the concept of a network without wires was first suggested more than two decades ago, it sparked the imagination of scientists, product vendors, and users around the globe eager for the convenience and flexibility of a free roaming connection. Unfortunately, as the variety of wireless solutions began to emerge, anticipation ...
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
This book provides readers with everything they need to make the most of Project 2003. Project 2003 helps users manage projects indepently or as part of a large organization. Business professionals can gain access into their portfolio of projects, and collaborate on the documents, issues and risks associated with those...
Make no mistake: the US government’s hundred-year-old war on marijuana isn’t over. Some 20 million Americans have been arrested on marijuana charges so far. The American marijuana industry remains underground, where modern-day moonshiners who view themselves as...
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...
This is the Proceedings of the 20th International Congress on Project Management and Engineering, that was held at the Technical University of Cartagena, Spain, from July 13 to 15, 2016. It brings together a collection of recent works of researchers and professionals in the Project Management and Engineering fields of Civil Engineering and...
This book provides a complete and comprehensive overview of 3G UMTS charging services
Evolving from offline billing of traditional telecommunications, charging for IP services in mobile networks is challenging; charging convergence is one of the major trends in the telecom industry. Advanced mobile...
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...
Financial engineers have access to enormous quantities of data but need powerful methods for extracting quantitative information, particularly about volatility and risks. Key features of this textbook are: illustration of concepts with financial markets and economic data, R Labs with real-data exercises, and integration of graphical and...