-
Author Maryann Karinch , Gregory Hartley
An International Spy Museum Bestseller!Have you ever been lied to? Of course you have, whether you knew it or not.Ever caught a spouse, business partner, parent, boss, or child brazenly lying right to your face? What if you could tell someone was lying, just by list....
Release Date 2005/09 -
Author Department Delhi Department of English University of Delhi
The Individual and Society: Essays, Stories and Poems is prescribed for the BA English (Discipline) course 'The Individual and Society', the concurrent inter-disciplinary course of the BA Honours programme, and the B.Com Honours Programme. The anthology consists o....
Release Date 2005/08 -
Author Michael Morrison
Wish your BlackBerry 7100 had come with a little more meat in the owner's manual? BlackBerry 7100 In a Snap is your wish come true. This task-oriented guide goes well beyond the BlackBerry 7100 owner's manual and guides you through its devices using practical usag....
Release Date 2005/07 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
Securing Your Business with Cisco ASA and PIX Firewalls
Author Greg Abelar
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occurLearn about the defense-in-depth model for deploying firewall and host protectionExamine naviga....
Release Date 2005/05 -
E-Health Care Information Systems: An Introduction for Students and Professionals
Author Joseph Tan
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, general science, and computing technology. This easily followed tex....
Release Date 2005/05 -
Author Justin Clarke , Nitesh Dhanjani
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. ....
Release Date 2005/04 -
Author Keith Mortier , Allen Keele
Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam obje....
Release Date 2005/04 -
IT Governance: Guidelines for Directors
Author Alan Calder
A director's guide to IT governanceThis book is an essential read for those sitting on the board of any organisation that wants to secure its information, its intellectual property and its competitive advantage.Written for a non-technical, commercially-minded audie....
Release Date 2005/04 -
Hardware Design Verification: Simulation and Formal Method-Based Approaches
Author William K. Lam
The Practical, Start-to-Finish Guide to Modern Digital Design VerificationAs digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project succ....
Release Date 2005/03 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
Boards That Deliver: Advancing Corporate Governance From Compliance to Competitive Advantage
Author Ram Charan
Finally, a book that brings the vision of truly good governance down to earth. Ram Charan, expert in corporate governance and best-selling author, packs this book with useful tools and techniques to take boards and their companies to a higher level of performance. C....
Release Date 2005/02 -
The Money Markets Handbook: A Practitioner's Guide
Author Moorad Choudhry
In The Money Markets Handbook Moorad Choudhry provides, in one comprehensive volume, the description, trading, analysis and calculations of the major markets around the world, providing worked examples and exercises throughout to provide a landmark publication on th....
Release Date 2005/01 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
Cisco QOS Exam Certification Guide (IP Telephony Self-Study), Second Edition
Author Michael J. Cavanaugh , Wendell CCIE No. 1624 Odom
Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, includingQoS concepts, tools, and architecturesModular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoSClassifica....
Release Date 2004/11 -
The Broadcast Century and Beyond, 4th Edition
Author Michael C Keith , Robert L Hilliard
The Broadcast Century and Beyond, 4th Edition, is a popular history of the most influential and innovative industry of the previous and current century. The story of broadcasting is told in a direct and informal style, blending personal insight and authoritative sch....
Release Date 2004/10 -
Author James M. Stewart
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing y....
Release Date 2004/10 -
Author James S. Tiller
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address th....
Release Date 2004/09 -
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
Cisco Network Design Solutions for Small-Medium Businesses
Author Peter Rybaczyk
Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.Design and implement effective network solutions by mastering the design proces....
Release Date 2004/08 -
Cisco Router Firewall Security
Author Richard A. Deal
Harden perimeter routers with Cisco firewall functionality and features to ensure network securityDetect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniquesUse Network-Based Application Re....
Release Date 2004/08 -
Weirdos in the Workplace: The New Normal… Thriving in the Age of the Individual
Author John Putzier - M.S. , SPHR
“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. Like it or not, the realities uncovered in this book are just that...real! And if you plan to be a significant player....
Release Date 2004/07 -
Windows Forensics and Incident Recovery
Author Harlan Carvey
Praise for Windows Forensics and Incident Recovery"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recomm....
Release Date 2004/07 -
The Tao of Network Security Monitoring Beyond Intrusion Detection
Author Richard Bejtlich
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners ....
Release Date 2004/07 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
Author Michael J. Panzner
To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market....
Release Date 2004/06 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06