-
Introduction to Cryptography with Coding Theory, 3rd Edition
Author Lawrence C. Washington , Wade Trappe
None Show and hide more
Release Date -0001/11 -
E-Mail Virus Protection Handbook
Author Syngress
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to profession....
Release Date 2000/11 -
Author Deborah E. Bouchoux
You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intelle....
Release Date 2001/04 -
Free as in Freedom [Paperback]
Author Sam Williams
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a drivi....
Release Date 2002/03 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Managing Your Intellectual Property Assets
Author Scott Shane
This book outlines and illustrates strategies that you must employ to protect your intellectual property. There are legal means available to you, and this book defines these means and explains them in plain language. If you want to protect your innovative product an....
Release Date 2008/11 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Author Patrice Bellagamba , Nash Darukhanawalla - CCIE No. 10332
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these techno....
Release Date 2009/06 -
Unequal Protection, 2nd Edition
Author Thom Hartmann
Unequal taxes, unequal accountability for crime, unequal influence, unequal control of the media, unequal access to natural resources—corporations have gained these privileges and more by exploiting their legal status as persons. How did something so illogical ....
Release Date 2010/06 -
Author Christian Bizer , Tom Heath
The World Wide Web has enabled the creation of a global information space comprising linked documents. As the Web becomes ever more enmeshed with our daily lives, there is a growing desire for direct access to raw data not currently available on the Web or bound up ....
Release Date 2011/02 -
Super Freedom: Create a Worry-Free Financial Future in 6 Steps
Author Trish Power
Super Freedom is just that ? a guide for women to super. This guide has a strong, aspirational focus on whatsuperannuation can provide for women, regardless of their marital circumstances, age or even their currentsuperannuation balances. For women it?s not so much ....
Release Date 2011/11 -
Author Mark D. Wolfinger
In an era where “buy and hold” investment strategies no longer work, investors desperately need portfolio protection. Fortunately, it’s available—in the form of options. In Why Trade Options? top trader and options instructor Mark D. Wolfinger shows how options can ....
Release Date 2012/01 -
Express Learning: Cryptography and Network Security
Author ITL Education Solutions Limited
Express Learning is a series of books designed as quick reference guides to important undergraduate computer courses. The organized and accessible format of these books allows students to learn important concepts in an easy-to-understand, question-and-answer format.....
Release Date 2012/01 -
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud
Author Lee Newcombe
Securing Cloud Services: A pragmatic approach to security architecture in the Cloud Every Cloud should have a secure lining Cloud Computing represents a major change to the IT services landscape. Cloud services, such as SalesForce, Amazon Web Services® and Microsoft....
Release Date 2012/07 -
Resource-Oriented Architecture Patterns for Webs of Data
Author Brian Sletten
The surge of interest in the REpresentational State Transfer (REST) architectural style, the Semantic Web, and Linked Data has resulted in the development of innovative, flexible, and powerful systems that embrace one or more of these compatible technologies. Howeve....
Release Date 2013/04 -
Author Paul Groth , Luc Moreau
The World Wide Web is now deeply intertwined with our lives, and has become a catalyst for a data deluge, making vast amounts of data available online, at a click of a button. With Web 2.0, users are no longer passive consumers, but active publishers and curators of....
Release Date 2013/09 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
The Scientification of Religion
Author Kocku von Stuckrad
The enigmatic relation between religion and science still presents a challenge to European societies and to ideas about what it means to be ‘modern.’ This book argues that European secularism, rather than pushing back religious truth claims, in fact has been religi....
Release Date 2014/05 -
Cathodic Corrosion Protection Systems
Author Alireza Bahadori
Corrosion is a naturally occurring cost, worth billions in the oil and gas sector. New regulations, stiffer penalties for non-compliance and aging assets are all leading companies to develop new technology, procedures and bigger budgets catering to one prevailing me....
Release Date 2014/07 -
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
Author Ted G. Lewis
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)"The book is written as a student t....
Release Date 2014/11 -
Data Protection and the Cloud: Are the risks too great?
Author Paul Ticher
Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to ....
Release Date 2015/02 -
Author Bruce Wimmer , CPP
Business Espionage: Risk, Threats, and Countermeasures provides the best practices needed to protect a company's most sensitive information. It takes a proactive approach, explaining the measures and countermeasures that can be enacted to identify both threats and....
Release Date 2015/03 -
Author Babak Akhgar , Colin Pattinson , Mohammad Dastbaz
We are living in the era of "Big Data" and the computing power required to deal with "Big Data" both in terms of its energy consumption and technical complexity is one of the key areas of research and development. The U.S. Environmental Protection Agency estimates t....
Release Date 2015/03 -
Freedom to Change: Four Strategies to Put Your Inner Drive into Overdrive
Author Michael Fullan
Break free to make real change for yourself and othersHave you ever felt like your progress was being blocked, not just by your own circumstances, but by the presence and actions of others? Freedom to Change releases you from the trap of constantly telling yourself....
Release Date 2015/06 -
Enterprise Security Architecture
Author Nicholas A Sherwood
Security is too important to be left in the hands of just one department or employee—it’s a concern of an entire enterprise. Enterprise Security Architecture shows that having a comprehensive plan requires more than the purchase of security software—it requires a fr....
Release Date 2015/09