-
Inside Network Security Assessment: Guarding Your IT Infrastructure
Author David Kim , Michael Gregg
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two high....
Release Date 2005/11 -
Video Systems in an IT Environment
Author Al Kovalick
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes te....
Release Date 2005/12 -
Intrusion Prevention Fundamentals
Author Jonathan Hogue , Earl Carter
An introduction to network attack mitigation with IPSWhere did IPS come from? How has it evolved?How does IPS work? What components does it have?What security needs can IPS address?Does IPS work with other security products? What is the “big picture”?What are the be....
Release Date 2006/01 -
Trust and Betrayal in the Workplace
Author Michelle L. Reina , Dennis S. Reina
More than ever, there is a need for trust in the workplace. After all, business is conducted via relationships, and trust is the foundation to effective relationships. Yet, trust means different things to different people and this is a big part of the problem. Coll....
Release Date 2006/01 -
Wealth: Grow It, Protect It, Spend It, and Share It
Author Stuart E. Lucas
Never has it been more important to read Wealth: Grow It, Protect It, Spend It, and Share It. More of us have created more wealth today than ever before; managing our retirement assets is increasingly our own responsibility; and America is bracing for the largest ....
Release Date 2006/02 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Developmental Assignments: Creating Learning Experiences Without Changing Jobs
Author Cynthia D McCauley
This book is modeled after "Eighty-eight Assignments for Development in Place," one of CCL's most popular publications. In the years since that report was published, we have learned more about development in place--from research, from working with managers and org....
Release Date 2006/02 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
The Manager's Pocket Guide to Using Consultants
Author David Newman
What if the next consultant you hired came with an instruction manual filled with strategies to maximize your end of the relationship? That's exactly what this pocket guide is – a practical how-to guide to taking full advantage of what the right consultant can prov....
Release Date 2006/03 -
Certified Ethical Hacker Exam Prep
Author Michael Gregg
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you t....
Release Date 2006/04 -
Microcontroller Based Applied Digital Control
Author Dogan Ibrahim
Combines the theory and the practice of applied digital controlThis book presents the theory and application of microcontroller based automatic control systems. Microcontrollers are single-chip computers which can be used to control real-time systems. Low-cost, sing....
Release Date 2006/04 -
Author Bob Seidensticker
Everyone knows that today's rate of technological change is unprecedented. With technological breakthroughs from the Internet to cell phones to digital music and pictures, everyone knows that the social impact of technology has never been as profound.But every....
Release Date 2006/04 -
CompTIA Security+™: Study Guide, Third Edition
Author Emmett Dulaney , Mike Pastore
Take charge of your career with certification that can increase your marketability. This new edition of the top-selling Guide is what you need to prepare for CompTIA's Security+ SY0-101 exam.Developed to meet the exacting requirements of today's certification cand....
Release Date 2006/05 -
Steal This Computer Book 4.0, 4th Edition
Author Wallace Wang
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacke....
Release Date 2006/05 -
Author Lawrence Landauer , Tom Gallagher , Bryan Jeffries
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before your softwa....
Release Date 2006/06 -
Security Development Lifecycle
Author Steve Lipner , Michael Howard
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security exp....
Release Date 2006/06 -
Author Ido Dubrawsky , Wes Noonan
The essential guide to understanding and using firewalls to protect personal computers and your networkAn easy-to-read introduction to the most commonly deployed network security deviceUnderstand the threats firewalls are designed to protect againstLearn basic firew....
Release Date 2006/06 -
Home Network Security Simplified
Author Nathan Clement , Neil Anderson , Jim Doherty
A straightforward, graphic-based reference for securing your home network Set up a firewallSecure your wireless networkStop adware and spywareKeep your children safe from online threatsPrevent a virus outbreakAvoid Internet scams Phishing. Malware. Spyware. Trojan h....
Release Date 2006/07 -
Web Accessibility: Web Standards and Regulatory Compliance
Author Andrew Kirkpatrick , Patrick H. Lauke , Jim Thatcher , Shawn Lawton Henry , Cynthia
The power of the Web lies in the fact that anyone and everyone can access it, and this should also extend to users with disabilities. Accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing web....
Release Date 2006/07 -
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Network Security Hacks, 2nd Edition
Author Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alar....
Release Date 2006/10 -
Author Pini Gurfil
In recent years, an unprecedented interest in novel and revolutionary space missions has risen out of the advanced NASA and ESA programs. Astrophysicists, astronomers, space systems engineers, mathematicians and scientists have been cooperating to implement novel an....
Release Date 2006/10 -
Author Brian T Contos
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist thre....
Release Date 2006/10 -
Designing and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT, and L7-filter
Author Lucian Gheorghe
Learn how to secure your system and implement QoS using real-world scenarios for networks of all sizesImplementing Packet filtering, NAT, bandwidth shaping, packet prioritization using netfilter/iptables, iproute2, Class Based Queuing (CBQ) and Hierarchical Token Bu....
Release Date 2006/10 -
Author Observer Foundation Observer Research Foundation
The Second Bush Presidency: Global Perspectives contains nine national perspectives on what a second Bush term portends for the world. Taken on one yardstick, five of the countries chosen (including the US) are members of the Security Council; using another, four ar....
Release Date 2006/10 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Deploying Zone-Based Firewalls
Author Ivan Pepelnjak
Deploying Zone-Based Firewalls (Digital Short Cut)Ivan PepelnjakISBN: 1-58705-310-1Improved firewall policy configuration means network administrators can more easily understand the effect of firewall policies on network traffic. This functionality allows the groupi....
Release Date 2006/11 -
Author Russell Dean Vines , CISSP , CISM , Security + , CCNA , MCSE , MCNE , Ronald L. Krutz
This follow-on edition to The CISSP Prep Guide: Mastering CISSP and ISSEP offers value-add coverage not featured anywhere else! You'll prepare for passing CISSP with a revised review of each of the ten CISSP domains, updated to reflect current thinking/technology, ....
Release Date 2006/11 -
Data Protection and Compliance in Context
Author Stewart Room
This comprehensive accessible guide for those with little or no legal knowledge provides detailed analysis of current data protection laws. It enables the reader to construct a platform on which to build internal compliance strategies. The author is chair of the Nat....
Release Date 2006/11