-
Author Stefano Fornari
Sync your email and other data with mobile devices using Funambol 7.1 About This BookProvide push email capabilities and synchronization services for mobile devices and PC software using Funambol Develop your own Funambol extensions Many examples explaining all fun....
Release Date 2009/12 -
Author M. K. Jabbi , Muchkund Dubey
At the tenth SAARC Summit, it was agreed that an inter-governmental social charter for South Asia under the aegis of SAARC would be prepared. In India, the Council for Social Development formulated the citizens' social charter. The development of the social char....
Release Date 2009/12 -
Managing Legal and Ethical Principles Revised Edition
Author Elearn
Stuck for ideas, inspiration or just want to work differently? Management Extra brings all the best management thinking together in one package. The books are practical and well structured to provide an in depth treatment of these management topics. Titles in ....
Release Date 2009/11 -
Handbook of Digital Forensics and Investigation
Author Eoghan Casey
This completely revised reference work will concentrate on providing specific practical information in a well organized format. Each chapter will have a consistent structure, covering similar aspects of different systems when appropriate. In order to provide reade....
Release Date 2009/11 -
Learning from Catastrophes: Strategies for Reaction and Response
Author Michael Useem , Howard Kunreuther
Events ranging from Hurricane Katrina to the global economic crisis have taught businesspeople an unforgettable lesson: if you don’t plan for “extreme risk,” you endanger your organization’s very survival. But how can you plan for events that go far beyond anything ....
Release Date 2009/11 -
BlackBerry Development Fundamentals
Author John M. Wargo
The BlackBerry smartphone is today’s #1 mobile platform for the enterprise and also a huge hit with consumers. Until now, it’s been difficult for programmers to find everything they need to begin developing new applications for BlackBerry devices. BlackBerry Develop....
Release Date 2009/11 -
Porting to the Symbian Platform: Open Mobile Development in C/C++
Author Mark Wilcox
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetrati....
Release Date 2009/11 -
CompTIA Security+ SY0-201 Practice Questions Exam Cram, Second Edition
Author Diane Barrett
800+ up-to-the-minute CompTIA Security+ practice questions: outstanding preparation for mastering every Security+ exam objectiveThe perfect complement to every CompTIA Security+ study resourceProvides all questions on both the book and CD, with detailed explanations....
Release Date 2009/11 -
CISA® Certified Information Systems Auditor All-in-One Exam Guide
Author Peter H. Gregory
"All-in-One is All You Need."CISA Certified Information Systems Auditor All in One Exam GuideGet complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit ....
Release Date 2009/10 -
Author Neal Allen
Network Maintenance and Troubleshooting GuideField-Tested Solutions for Everyday Problems, Second EditionNeal AllenThe 100% practical, real-world guide to anticipating, finding, and solving network problems—fast!Real-life networks don’t always behave “by the book.” ....
Release Date 2009/10 -
Author Ido Dubrawsky
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; appl....
Release Date 2009/10 -
Author Rainer Erkens , Nils Haustein , Ulf Troppens , Wolfgang Müller-Friedt , Rainer Wolaf
All you need to know about Storage Area NetworksThe amount of data of an average company doubles every year. Thus, companies who own 1TB of data today will own 32TB in five years. Storage networks help to tame such data quantities and to manage this data growth effi....
Release Date 2009/09 -
Unauthorised Access: Physical Penetration Testing For IT Security Teams
Author Wil Allsopp
The first guide to planning and performing a physical penetration test on your computer's securityMost IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT ....
Release Date 2009/09 -
The Prompt Payment Act Answer Book
Author William G. Arnold
Find the Answers You Need to Comply with the Prompt Payment Act!It can be challenging for federal agencies to comply with the Prompt Payment Act. Although the basic rules are simple, they can be difficult to interpret and apply properly — until now. Designed a....
Release Date 2009/09 -
The Antideficiency Act Answer Book
Author William G. Arnold
Avoid Violations of the Antideficiency Act!Antideficiency Act (ADA) violations within both the financial and audit communities are now at an all-time high. Violations often result from a lack of knowledge about what is and what is not permissible under the law....
Release Date 2009/09 -
The CSSLP™ Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
Author Alexander J. Fry , Ronald L. Krutz
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional examThe CSSLP (Certified Secure Software Lifecycle Professional) is a new certification that incorporates government standards and best practices for secure software developm....
Release Date 2009/08 -
Author Park Foreman
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infras....
Release Date 2009/08 -
CompTIA Security+ Certification Study Guide, 3rd Edition
Author Ido Dubrawsky
CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification. The book is organized into six parts. Part 1 deals with general security issues including secur....
Release Date 2009/08 -
CBAP Certified Business Analysis Professional All-in-One Exam Guide
Author Joseph Phillips
All-in-One is All You Need!Get complete coverage of all the material included on the International Institute of Business Analysis CBAP exam inside this comprehensive resource. Written by industry expert, trainer, and project management consultant Joseph Phillips, th....
Release Date 2009/07 -
Author Christian Collberg , Jasvir Nagra
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.” —Mikhail Atallah, Distinguished Professor of Computer Sci....
Release Date 2009/07 -
Pro Business Activity Monitoring in BizTalk 2009
Author Geoff Snowman , Jeff Sanders
Business Activity Monitoring, or BAM, provides real-time business intelligence by capturing data as it flows through a business system. By using BAM, you can monitor a business process in real time and generate alerts when the process needs human intervention. Pro B....
Release Date 2009/07 -
Fundamentals of Computer Graphics, 3rd Edition
Author Steve Marschner , Michael Ashikhmin , Peter Shirley
With contributions by Michael Ashikhmin, Michael Gleicher, Naty Hoffman, Garrett Johnson, Tamara Munzner, Erik Reinhard, Kelvin Sung, William B. Thompson, Peter Willemsen, Brian Wyvill. The third edition of this widely adopted text gives students a comprehensive, fu....
Release Date 2009/07 -
Author Carol Stoner , Kate Grace MacElveen , Tom Bepler , Katherine Holt
As a trainer and educator, you may be looked to for information and leadership in driving a green initiative in your organization. This Infoline is designed to help trainers take personal and professional action to lead the green evolution. After talking about going....
Release Date 2009/07 -
Mobile Security: A Pocket Guide
Author Steven Furnell
A concise and practical guide to mobile securityThis pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone.Written by one of the country's top academic experts on information security, the guide covers s....
Release Date 2009/07 -
Author S. K. Basu
Auditing is a multi-dimensional subject. The scope of auditing is not only restricted to financial audit under the Companies Act, but has also been extended to cost accounting aspects, managerial policies, operational efficiencies and system applications and audit u....
Release Date 2009/07 -
Disappearing Cryptography, 3rd Edition
Author Peter Wayner
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integr....
Release Date 2009/06 -
Author Sean Power , Alistair Croll
Do you really understand your online presence? Are you confident that visitors can use your website? Do you know their motivations? How do online communities perceive your company? To innovate and adapt your business quickly, you must know the answers to these ques....
Release Date 2009/06 -
Author Patrice Bellagamba , Nash Darukhanawalla - CCIE No. 10332
As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these techno....
Release Date 2009/06 -
Network Access Control For Dummies®
Author Denzil Wessels , Rich Campagna , Jay Kelley
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, a....
Release Date 2009/05