-
CompTIA Security+™ Deluxe: Study Guide
Author Emmett Dulaney
CompTIA Security+ Deluxe Study Guide gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and insights drawn from real-world experience and review your newly acquire....
Release Date 2008/11 -
CompTIA Security+™: Study Guide, Fourth Edition
Author Emmett Dulaney
Revised and updated to include the most up-to-date information, CompTIA Security+ Study Guide, 4th Edition gives you complete coverage of the Security+ exam objectives with clear and concise information on crucial security topics. Learn from practical examples and i....
Release Date 2008/11 -
Author Michael Gregg , David R. Miller
Updated for the new CompTIA Security+ exam, this book focuses on the latest topics and technologies in the ever-evolving field of IT security and offers you the inside scoop on a variety of scenarios that you can expect to encounter on the job—as well as step-by-ste....
Release Date 2008/11 -
Author Andrew Mason
As a final exam preparation tool, the CCSP SNAF Quick Reference provides a concise review of all objectives on the SNAF exam (642-524). This digital Short Cut provides you with detailed, graphical-based information, highlighting only the key topics in cram-style for....
Release Date 2008/11 -
31 Days Before Your CCNA Exam: A Day-by-Day Review Guide for the CCNA 640-802 Exam, Second Edition
Author Allan Johnson
31 Days Before your CCNA Exam, Second Edition, offers you a personable and practical way to understand the certification process, commit to taking the exam, and finish your preparation using a variety of Foundational and Supplemental study resources.The book breaks ....
Release Date 2008/11 -
Managing Your Intellectual Property Assets
Author Scott Shane
This book outlines and illustrates strategies that you must employ to protect your intellectual property. There are legal means available to you, and this book defines these means and explains them in plain language. If you want to protect your innovative product an....
Release Date 2008/11 -
Data Protection vs. Freedom of Information
Author Paul Ticher
How would you respond to a freedom of information request, whilst ensuring compliance with the Data Protection Act?Get clear and practical guidance on this key data governance issue!Freedom of information is often mentioned in the same breath as data protection. In ....
Release Date 2008/11 -
Control Systems Engineering, Second Edition
Author S. K. Bhattacharya
Control Systems Engineering is a comprehensive text designed to cover the complete syllabi of the subject offered at various engineering disciplines at the undergraduate level. The book begins with a discussion on open-loop and closed-loop control systems. The block....
Release Date 2008/11 -
Author Jason D. O’Grady
Here is your essential companion to the nuvi. The Garmin nuvi Pocket Guide steers you through how to: Set up and quickly start using your nuvi.Personalize nuvi.Find your destinations and points of interest (POIs).Master multiple-point routing.Create proximity alerts....
Release Date 2008/10 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Metamodelling for Software Engineering
Author Brian Henderson-Sellers , Cesar Gonzalez-Perez
This book focuses on metamodelling as a discipline, exploring its foundations, techniques and results. It presents a comprehensive metamodel that covers process, product and quality issues under a common framework.Issues covered include:An explanation of what metamo....
Release Date 2008/10 -
Computer Forensics For Dummies®
Author Reynaldo Anzaldua , Linda Volonino
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving th....
Release Date 2008/10 -
ISO27001 / ISO27002 A Pocket Guide
Author Alan Calder
Use ISO27001 to protect your organisation's information assets This helpful, handy ISO27001/ISO27002 pocket guide gives a useful overview of these two important information security standards. Read this pocket guide to learn about: The ISO/IEC 27000Family of Info....
Release Date 2008/10 -
An Introduction to Information Security and ISO27001: A Pocket Guide
Author Steve G Watkins
This new pocket guide is intended to meet the needs of two groups: Individual readers who have turned to it as an introduction to a topic that they know little about; and organizations implementing, or considering implementing, some sort of information security mana....
Release Date 2008/10 -
Version Control with Subversion, 2nd Edition
Author Brian W. Fitzpatrick , Ben Collins-Sussman , C. Michael Pilato
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its c....
Release Date 2008/09 -
Building Expertise: Cognitive Methods for Training and Performance Improvement
Author Ruth Colvin Clark
This third edition of the classic resource, Building Expertise draws on the most recent evidence on how to build innovative forms of expertise and translates that evidence into guidelines for instructional designers, course developers and facilitators, technical com....
Release Date 2008/09 -
Cisco Secure Firewall Services Module (FWSM)
Author Arvind CCIE No. 7016 Durai , Ray CCIE No. 7050 Blair
Cisco Secure Firewall Services Module (FWSM)Best practices for securing networks with FWSMRay Blair, CCIE® No. 7050Arvind Durai, CCIE No. 7016The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 ....
Release Date 2008/08 -
The IT Regulatory and Standards Compliance Handbook
Author Craig S. Wright
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and t....
Release Date 2008/07 -
Scene of the Cybercrime, 2nd Edition
Author Michael Cross , Debra Littlejohn Shinder
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the firs....
Release Date 2008/07 -
Author Lisa Chen , Lisa Witter
Women are a huge, uniquely receptive but still underutilized audience for a whole range of social and political causes, not just “women's issues.” In The She Spot, Lisa Witter and Lisa Chen, top executives in the nation's largest public interest communication....
Release Date 2008/06 -
Selecting the Right NAP Architecture
Author Microsoft , Inc.
The objective of this guide is to provide a consistent structure for addressing the decisions and activities most critical to the successful implementation of the Microsoft® Network Access Protection (NAP) infrastructure. This guide includes several specific questio....
Release Date 2008/05 -
Software Security Engineering: A Guide for Project Managers
Author Nancy R. Mead , Gary McGraw , Robert J. Ellison , Sean Barnum , Julia H. Allen
“This book’s broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security t....
Release Date 2008/05 -
Corporate Governance in China: Research and Evaluation
Author Li Wei-An
Great progress has been achieved for the structural reform in China enterprises for the past one and a half decades. Along with the reform, the corporate governance structure has been established accordingly. The Chinese Corporate Governance Index (CCGI?NK) is a use....
Release Date 2008/05 -
Author Debra Golden , Margaret Murphy
You don't need to be a professional trainer to deliver a great training session. With a basic knowledge of adult learner preferences and instructional design, anyone can deliver engaging and useful training. This Infoline is designed with the "occasional" trainer i....
Release Date 2008/05 -
Digital Storytelling, 2nd Edition
Author Carolyn Handler Miller
Equally useful for seasoned professionals and those new to the field, Carolyn Handler Miller covers effective techniques for creating compelling narratives for a wide variety of digital media. Written in a clear, non-technical style, it offers insights into the proc....
Release Date 2008/04 -
Author Zulfikar Ramzan , Markus Jakobsson
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a....
Release Date 2008/04 -
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition
Author Ross J. Anderson
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better.....
Release Date 2008/04 -
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Author Daniel V. Hoffman
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps ha....
Release Date 2008/04 -
Web 2.0 Mash-ups and the New Aggregators
Author Martin Kelley
Web aggregators select and present content culled from multiple sources, playing an important taste-making and promotional role. Larger aggregators are starting to compete with mainstream news sources but a new class of niche and do-it-yourself aggregators are orga....
Release Date 2008/04