As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
This groundbreaking resource offers you new insights for building and evolving open systems using the best mix of standards for your software development projects. Numerous books have been published that describe individual computer standards, but only Open Systems and Standards for Software Product Development presents a framework for...
Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...
Developing a new web application should not mean reinventing the wheel. Thats why a framework is an essential item in your development toolbox. It helps you respect coding standards; write bulletproof, maintainable code; and focus on business rules rather than waste time on repetitive tasks. This book introduces you to symfony, the leading...
The 70-293 exam is a core exam for the MCSE Windows 2003 certification, and tests professionals on their ability to plan and maintain a Windows 2003 network infrastructure. As of January 2003 there were over 200,000 Microsoft Certified Professionals. Not only will the majority of these be looking to upgrade to their 2003 MCSE, but the exam is...
One thing at least is certain about tomorrow's global communications: broadband networks will be packetized. But how exactly will we get there from here? Before all the i's get dotted and t's crossed, leaders in telecom and networking have to make some hard choices. This is the book that can...
A practical, accessible survey of telecommunications and data communications services and technologies
Finally, there is a commonsense guide to telecommunications and data communications that non-engineers can understand. Popular author Ray Horak provides comprehensive, up-to-date information in plain English, instead of confusing technotalk....
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.
Drawing on his extensive experience consulting on large-scale ESX Server implementations,...
The seventh edition of the Manual of Obstetrics is the first without the authorship and editorial guidance of Dr. Ken Niswander. It was Dr. Niswander who created the Manual of Obstetrics in 1980 and served as the sole editor for the first three editions. For the fourth edition,...
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...