 |
|
|
|
 |  |  Network-Centric Service Oriented EnterpriseThe emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for... |  |  Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
|
 Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |  |  Machine Learning in Action
After college I went to work for Intel in California and mainland China. Originally my plan was to go back to grad school after two years, but time flies when you are having fun, and two years turned into six. I realized I had to go back at that point, and I didn’t want to do night school or online learning, I wanted to sit on... |  |  How to Cheat at Managing Information SecurityInformation security is different from many other disciplines both within mainstream information technology and other business areas. Even though there are now many good books on various areas, getting the breadth of knowledge across the many subareas is still difficult, but it is essential to success.
Unlike so many... |
|
 Intranets - a guide to their design, implementation and managementThis book may appeal to anyone requiring an overview of the technological and cultural implications of adopting information and knowledge management solutions using Internet technologies.
The book examines the tactical issues addressed at a functional or departmental level and their impact upon the organisation as a whole from a... |  |  Chess For DummiesIt was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real... |  |  Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |
|
|
Result Page: 8 7 6 5 4 3 2 1 |