-
Author Duane Nickull , Dion Hinchcliffe , James Governor
Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. So what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenome....
Release Date 2009/05 -
The Complete Idiot's Guide to Business Law
Author Cara C. Putman
The only guide of its kind! Undergraduate college students working toward business degrees, MBA graduate students, and first year law students have one thing in common: they need to take courses in business law. Unlike cumbersome and expensive textbooks, The Comple....
Release Date 2009/05 -
Author Andy Oram , John Viega
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by....
Release Date 2009/04 -
Author Peter Krogh
One of the main concerns for digital photographers today is asset management: how to file, find, protect, and re-use their photos. The best solutions can be found in The DAM Book, our bestselling guide to managing digital images efficiently and effectively. Anyone w....
Release Date 2009/04 -
Unsolved Problems in Mathematical Systems and Control Theory
Author Vincent D. Blondel , Alexandre Megretski
This book provides clear presentations of more than sixty important unsolved problems in mathematical systems and control theory. Each of the problems included here is proposed by a leading expert and set forth in an accessible manner. Covering a wide range of areas....
Release Date 2009/04 -
The Definitive Guide to Plone, Second Edition
Author Andy McKay , Fabrizio Reale , Alice Narduzzo , Davide Moro , Maurizio Delmonte
The Definitive Guide to Plone, Second Edition has been completely updated to cover version 3 of Plone and its newest features. This book provides a complete and detailed overview of Plone. It is divided into three parts, which cover using, configuring, and developin....
Release Date 2009/04 -
CISSP Exam Cram, Second Edition
Author Michael Gregg
Updated for 2009Covers the critical information you’ll need to know to score higher on your CISSP exam!Build and manage an effective, integrated security architectureSystematically protect your physical facilities and the IT resources they containImplement and admin....
Release Date 2009/03 -
Author Andrew Mason
As a final exam preparation tool, the CCSP SNRS Quick Reference provides a concise review of all objectives on the SNRS exam (642-504). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style for....
Release Date 2009/03 -
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Author Jack B. Voth , Keatron Evans , Andrew Whitaker
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing themNowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve th....
Release Date 2009/02 -
Computer Security Handbook, Fifth Edition
Author M.E. KABAY , ERIC WHYNE , SEYMOUR BOSWORTH
The classic and authoritative reference in the field of computer security, now completely updated and revised.With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that....
Release Date 2009/02 -
Author Martin Nystrom , Chris Fry
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to mon....
Release Date 2009/02 -
Author Ryan Lindfield
CCSP SNAA Quick Reference (Digital Short Cut)Ryan LindfieldISBN-10: 1-58705-877-4ISBN-13: 978-1-58705-877-6As a final exam preparation tool, the CCSP SNAA Quick Reference provides a concise review of all objectives on the SNAA exam (642-515). This digital Short Cut ....
Release Date 2009/02 -
Author John Ross
Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that?Network Know-How is....
Release Date 2009/02 -
How to Survive a Data Breach: A Pocket Guide
Author Stewart Mitchell
This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with s....
Release Date 2009/02 -
Scanning Negatives and Slides, 2nd Edition
Author Sascha Steinhoff
Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor....
Release Date 2009/02 -
Sociology and Social Anthropology in India
Author Yogesh Atal
The Indian Council of Social Science Research, the premier organization for social science research in India, conducts periodic surveys in the major disciplines of the social sciences to assess disciplinary developments as well as to identify gaps in research in ....
Release Date 2009/02 -
Author Robert Morgan , Jean-Louis Bravard
A focused, implementation-orientated, executive-level book on outsourcing by two globally known practitioners.The outsourcing market is booming, the total outsourcing market in EMA forecasts a $59 billion dollar growth between 2004 and 2007.Fills a fills a major gap....
Release Date 2009/01 -
Author Agnieszka Klus , John Bambenek
grep Pocket Reference is the first guide devoted to grep, the powerful Unix content-location utility. This handy book is ideal for system administrators, security professionals, developers, and others who want to learn more about grep and take new approaches with it....
Release Date 2009/01 -
How to Use Web 2.0 and Social Networking Sites Securely
Author IT Governance Research Team
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Release Date 2009/01 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Author Tilak Mitra , Clive Gee , Robert G. Laird , William A. Brown
Address the #1 Success Factor in SOA Implementations: Effective, Business-Driven GovernanceInadequate governance might be the most widespread root cause of SOA failure. In SOA Governance, a team of IBM’s leading SOA governance experts share hard-won best practices f....
Release Date 2008/12 -
CompTIA Security+™: Review Guide
Author James M. Stewart
This review guide is broken into six parts, each one corresponding to one of the six domain areas of the Security+ exam: systems security, network infrastructure, access control, assessments and audits, cryptography, and organizational security. You’ll find this boo....
Release Date 2008/12 -
CompTIA Security+ Exam Cram, Second Edition
Author Martin Weiss , Kalani K. Hausman , Diane Barrett
CompTIA® Security+ Exam CramSecond EditionExam SY0-201Diane BarrettKirk HausmanMartin WeissThe Smart Way to Study™Covers the critical information you need to know to score higher on your Security+ exam!Master and implement general security best practicesSystematical....
Release Date 2008/12 -
How to Develop and Implement a Security Master Plan
Author Timothy Giles
Engage Stakeholders with a Long-Term SolutionThe goal: Convince executive management to "buy in" to your security program, support it, and provide the largest possible amount of funding.The solution: Develop a meticulously detailed long-term plan that sells decisio....
Release Date 2008/12 -
The Complete Idiot's Guide to Enhancing Your Social IQ
Author Gregory P. Korgeski
Simple steps to connecting with others. Now readers can raise their social intelligence quotient with a little self-Knowledge and practice. Beginning with a series of short quizzes that generate a personal social profile, this guide explains how readers can enhance....
Release Date 2008/12 -
Author George Spafford
Do you know what your IT systems cost your business in electricity?Organisations are not always aware of how much of their electricity bill goes on data storage. This is because the amount of money they are spending on the electricity for IT systems is often hidden ....
Release Date 2008/12