-
Linksys® WRT54G Ultimate Hacking
Author Paul Asadoorian , Larry Pesce
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different....
Release Date 2007/06 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
Microsoft® Mobile Development Handbook
Author Peter Foot , Daniel Moth , Andy Wigley
Learn the essentials for developing mobile applications for any Windows-based mobile device. Focusing on proven techniques and practices, this guide addresses the real-world needs of experienced Microsoft Windows® mobile developers. Users are growing increasingly d....
Release Date 2007/05 -
Author Michael Gregg
CISA Exam PrepCertified Information Systems AuditorMichael GreggYour Complete Certification Solution!The Smart Way to Study™In This Book You’ll Learn How To:Approach the IS audit process from ISACA’s view of IS auditing best practicesRelate and apply information sec....
Release Date 2007/05 -
Author Alan Calder
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to your business, this pocket guide is for you. It outlines the key drivers for IT governance in the modern global economy, with particular reference to corporate governan....
Release Date 2007/05 -
Risk Assessment for Asset Owners
Author Steve Watkins , Alan Calder
Understand ISO 38500: the standard for the corporate governance of ITISO/IEC38500 is the international standard for the corporate governance of information and communication technology. The purpose of the standard is to create a framework to ensure that the Board is....
Release Date 2007/05 -
Take Control of Syncing in Tiger
Author Michael E. Cohen
Learn how to synchronize all your data between Macs, or with mobile phones, PDAs, and iPods!Frustrated in your attempts to synchronize data between your Macs, or with other devices? Michael E. Cohen is here to help. With clear directions and a humorous touch, his 13....
Release Date 2007/05 -
Take Control of What’s New in Entourage 2004
Author Tom Negrino
You can take control of Entourage 2004, Microsoft's powerful email client and project manager! If you use Entourage 2004 (or are considering upgrading), you need this ebook to make the most of Entourage's new and enhanced features. Learn how to ban spam from your ....
Release Date 2007/05 -
Author Dan Ablan
You hold in your hands the best-selling guide to NewTek's LightWave 3D animation software, completely updated for LightWave v9 by award-winning animator and trainer Dan Ablan. Rather than rehash the documentation like other books, this down-to-earth, easy-to-follow....
Release Date 2007/03 -
Author Mark S. Kadrich - CISSP
A Comprehensive, Proven Approach to Securing All Your Network Endpoints!Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert M....
Release Date 2007/03 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Sarbanes-Oxley Ongoing Compliance Guide: Key Processes and Summary Checklists
Author Anne M. Marchetti
Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial ....
Release Date 2007/03 -
Author Maryann Karinch , Gregory Hartley
Are you in business, journalism, law enforcement, or medicine?Do you face students in a classroom or criminals in a courtroom?Are you in a relationship or looking for one?Do you have children?Then you need the skills to read them like a book!I Can Read You Like a Bo....
Release Date 2007/03 -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Business and Competitive Analysis: Effective Application of New and Classic Methods
Author Babette E. Bensoussan , Craig S. Fleisher
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.” --Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and bu....
Release Date 2007/02 -
Taming Heterogeneity and Complexity of Embedded Control
Author Salah Laghrouche , Elena Panteley , Antonio Loria , Françoise Lamnabhi-Lagarrigu
This book gathers together a selection of papers presented at the Joint CTS-HYCON Workshop on Nonlinear and Hybrid Control held at the Paris Sorbonne, France, 10-12 July 2006. The main objective of the Workshop was to promote the exchange of ideas and experiences an....
Release Date 2007/02 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Author Andrew Mason
Cisco Firewall Technologies (Digital Short Cut)Andrew MasonISBN-10: 1-58705-329-2ISBN-13: 978-1-58705-329-0Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these....
Release Date 2007/01 -
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design
Author Paul Forbes , Jason Frazier , Lou Ronnau , Denise Helfrich
Cisco Network Admission ControlVolume I: NAC Framework Architecture and DesignA guide to endpoint compliance enforcementToday, a variety of security challenges affect all businesses regardless of size and location. Companies face ongoing challenges with the fight ag....
Release Date 2006/12 -
Network Security Assessment: From Vulnerability to Patch
Author Andrew Gold , Ken Pfeil , Steve Manzuik
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is uni....
Release Date 2006/12 -
Author Paul Crowley
CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corpo....
Release Date 2006/12 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Author Russell Dean Vines , CISSP , CISM , Security + , CCNA , MCSE , MCNE , Ronald L. Krutz
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, ....
Release Date 2006/11 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11 -
Network Security Hacks, 2nd Edition
Author Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alar....
Release Date 2006/10 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter
Author Lucian Gheorghe
Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesImplementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bu....
Release Date 2006/10 -
Author Observer Foundation Observer Research Foundation
The Second Bush Presidency: Global Perspectives contains nine national perspectives on what a second Bush term portends for the world. Taken on one yardstick, five of the countries chosen (including the US) are members of the Security Council; using another, four ar....
Release Date 2006/10