-
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Home Network Security Simplified
Author Nathan Clement , Neil Anderson , Jim Doherty
A straightforward, graphic-based reference for securing your home network Set up a firewallSecure your wireless networkStop adware and spywareKeep your children safe from online threatsPrevent a virus outbreakAvoid Internet scams Phishing. Malware. Spyware. Trojan h....
Release Date 2006/07 -
Web Accessibility: Web Standards and Regulatory Compliance
Author Andrew Kirkpatrick , Patrick H. Lauke , Jim Thatcher , Shawn Lawton Henry , Cynthia
The power of the Web lies in the fact that anyone and everyone can access it, and this should also extend to users with disabilities. Accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing web....
Release Date 2006/07 -
Author Lawrence Landauer , Tom Gallagher , Bryan Jeffries
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before your softwa....
Release Date 2006/06 -
Security Development Lifecycle
Author Steve Lipner , Michael Howard
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security exp....
Release Date 2006/06 -
Author Ido Dubrawsky , Wes Noonan
The essential guide to understanding and using firewalls to protect personal computers and your networkAn easy-to-read introduction to the most commonly deployed network security deviceUnderstand the threats firewalls are designed to protect againstLearn basic firew....
Release Date 2006/06 -
CompTIA Security+™: Study Guide, Third Edition
Author Emmett Dulaney , Mike Pastore
Take charge of your career with certification that can increase your marketability. This new edition of the top-selling Guide is what you need to prepare for CompTIA's Security+ SY0-101 exam.Developed to meet the exacting requirements of today's certification cand....
Release Date 2006/05 -
Steal This Computer Book 4.0, 4th Edition
Author Wallace Wang
This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters discussing the hacke....
Release Date 2006/05 -
Certified Ethical Hacker Exam Prep
Author Michael Gregg
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you t....
Release Date 2006/04 -
Microcontroller Based Applied Digital Control
Author Dogan Ibrahim
Combines the theory and the practice of applied digital controlThis book presents the theory and application of microcontroller based automatic control systems. Microcontrollers are single-chip computers which can be used to control real-time systems. Low-cost, sing....
Release Date 2006/04 -
Author Bob Seidensticker
Everyone knows that today's rate of technological change is unprecedented. With technological breakthroughs from the Internet to cell phones to digital music and pictures, everyone knows that the social impact of technology has never been as profound.But every....
Release Date 2006/04 -
The Manager's Pocket Guide to Using Consultants
Author David Newman
What if the next consultant you hired came with an instruction manual filled with strategies to maximize your end of the relationship? That's exactly what this pocket guide is – a practical how-to guide to taking full advantage of what the right consultant can prov....
Release Date 2006/03 -
Wealth: Grow It, Protect It, Spend It, and Share It
Author Stuart E. Lucas
Never has it been more important to read Wealth: Grow It, Protect It, Spend It, and Share It. More of us have created more wealth today than ever before; managing our retirement assets is increasingly our own responsibility; and America is bracing for the largest ....
Release Date 2006/02 -
Protecting Your Company's Intellectual Property
Author Deborah E. Bouchoux
A company’s most valuable assets may not be physical. This book shows how to protect them without fences or security guards! You can’t touch it or feel it. Sometimes you can’t even see it. Yet, intellectual property continues to soar in value, comprising an increas....
Release Date 2006/02 -
Developmental Assignments: Creating Learning Experiences Without Changing Jobs
Author Cynthia D McCauley
This book is modeled after "Eighty-eight Assignments for Development in Place," one of CCL's most popular publications. In the years since that report was published, we have learned more about development in place--from research, from working with managers and org....
Release Date 2006/02 -
Author Stoyan Stefanov , Jeremy Rogers
Secure your Linux server and protect it from intruders, malware attacks, and other external threatsAbout This BookLeverage this guide to confidently deliver a system that reduces the risk of being hackedPerform a number of advanced Linux security techniques such as ....
Release Date 2006/02 -
Intrusion Prevention Fundamentals
Author Jonathan Hogue , Earl Carter
An introduction to network attack mitigation with IPSWhere did IPS come from? How has it evolved?How does IPS work? What components does it have?What security needs can IPS address?Does IPS work with other security products? What is the “big picture”?What are the be....
Release Date 2006/01 -
Trust and Betrayal in the Workplace
Author Michelle L. Reina , Dennis S. Reina
More than ever, there is a need for trust in the workplace. After all, business is conducted via relationships, and trust is the foundation to effective relationships. Yet, trust means different things to different people and this is a big part of the problem. Coll....
Release Date 2006/01 -
Video Systems in an IT Environment
Author Al Kovalick
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes te....
Release Date 2005/12 -
Inside Network Security Assessment: Guarding Your IT Infrastructure
Author David Kim , Michael Gregg
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two high....
Release Date 2005/11 -
Author Dave Mabe
The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than ....
Release Date 2005/10 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10 -
The Official Adobe Print Publishing Guide, Second Edition
Author Brian P. Lawler
THE KEY TO SUCCESSFUL PRINT PRODUCTION is an understanding of the entire workflow, from scanning and file creation through prepress and print production. Fully updated by author and publishing consultant Brian Lawler, The Official Adobe Print Publishing Guide, Secon....
Release Date 2005/10 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Linux Firewalls, Third Edition
Author Robert Ziegler , Steve Suehring
An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first t....
Release Date 2005/09 -
Author Michael Gregg
A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam....
Release Date 2005/09 -
Author Robert C. Seacord
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specif....
Release Date 2005/09 -
Business Continuity and Disaster Recovery for InfoSec Managers
Author James F. Ransome , PhD , CISM , CISSP , John Rittinghouse , PhD , CISM
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses t....
Release Date 2005/09