-
Oracle SOA Governance 11g Implementation
Author Andrew Bell , Luis Augusto Weir
Being able to implement SOA governance competently can make a huge difference to your organization’s efficiency. This guide shows you how through a complete practical course based on Oracle’s highly regarded software suite.Understand SOA governance including its key....
Release Date 2013/09 -
Author Konstantin Kerekovski , Bal Mukund Sharma , Krishna Kumar K M , Nassyam Basha , YV R
Work with Oracle database’s high-availability and disaster-management technologies. This book covers all the Oracle high-availability technologies in one place and also discusses how you configure them in engineered systems and cloud services.You will see that when....
Release Date 2019/05 -
Option Trading Loss Recovery Strategies
Author Michael C. Thomsett
How options can help you recover losses in stock investments you still want to keep.In volatile markets, inevitable paper losses tie up capital and prevent you from moving ahead. So what do you do? Do you just wait and hope the market price rebounds? Do you cut your....
Release Date 2010/06 -
Optical Coding Theory with Prime
Author Guu-Chang Yang , Wing C. Kwong
Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory—until now. Written by renowned authorities in the field, O....
Release Date 2013/05 -
OPNsense Beginner to Professional
Author Julio Cesar Bueno de Camargo
Work with one of the most efficient open-source FreeBSD-based firewall and routing solutions to secure your network with easeKey FeaturesLearn end-to-end OPNsense firewall implementation and managementDefend against attacks by leveraging third-party plugins such as Nginx and SenseiGrasp hands-on exa....
Release Date 2022/06 -
Author Ric Messier
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, t....
Release Date 2015/11 -
Once More Unto the Breach: Managing information security in an uncertain world
Author Andrea C Simmons
The role of the information security manager has changed. Have you? The challenges you face as an information security manager (ISM) have increased enormously since the first edition of Once more unto the breach was published. What seemed exceptional in 2011 is t....
Release Date 2015/02 -
Author Andrea Simmons
Understand the role of Information Security ManagersYour responsibilities as an information security manager are critical. Advising on protecting the organisation's assets, security and data systems, not to mention its reputation, are in your hands. A major securit....
Release Date 2012/08 -
OHSAS 18001 Step by Step: A Practical Guide
Author Naeem Sadiq
An essential guide to OHSAS 18001 We say 'take care' as we wave our loved ones goodbye in the morning, but how often is this message taken into the workplace? In this easy-to-understand and timely pocket guide, Naeem Sadiq, examines the Understanda as it gears ....
Release Date 2012/04 -
Author Soren Kenner , Imran Rashid
Authors Imran Rashid and Soren Kenner have sparked an international debate by revealing the “mind hacks” Facebook, Apple, Google, and Instagram use to get you and your children hooked on their products. In Offline, they deliver an eye-opening research-based journey....
Release Date 2019/02 -
Official Samba-3 HOWTO and Reference Guide, The
Author Jelmer R. Vernooij , John H. Terpstra
"The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of SambaThe practical, authoritative, step-by-st....
Release Date 2003/10 -
Official (ISC)2® Guide to the ISSMP® CBK®
Author Joseph Steinberg , Harold F. Tipton
As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Securi....
Release Date 2011/04 -
Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition
Author ² Corporate
Candidates for the CISSP-ISSAP professional certification need to not only demonstratea thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture.Supplyi....
Release Date 2013/08 -
Official (ISC)2 Guide to the SSCP CBK, 2nd Edition
Author Harold F. Tipton , J Dewar , R Anderson
The (ISC) Systems Security Certified Practitioner (SSCP ) certification is one of the most important credentials an information security practitioner can have. Having helped thousands of people around the world obtain this distinguished certification, the bestselli....
Release Date 2010/12 -
Official (ISC)2 Guide to the CSSLP
Author Mano Paul
As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a t....
Release Date 2015/09 -
Official (ISC)2 Guide to the CISSP CBK, Fourth Edition, 4th Edition
Author Adam Gordon
As a result of a rigorous, methodical process that (ISC)² follows to routinely update its credential exams, it has announced that enhancements will be made to both the Certified Information Systems Security Professional (CISSP) credential, beginning April 15, 2015. ....
Release Date 2015/09 -
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Author Patrick D. Howard
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization....
Release Date 2016/04 -
OAuth 2.0 Identity and Access Management Patterns
Author Martin Spasovski
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.Build web, client-side, desktop,....
Release Date 2013/11 -
Author Adolfo Eloy Nascimento
Efficiently integrate OAuth 2.0 to protect your mobile, desktop, Cloud applications and APIs using Spring Security technologies.About This BookInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Securit....
Release Date 2017/10 -
Author Justin Richer Antonio Sanso
SummaryOAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client an....
Release Date 2017/03 -
Nonparametric Statistical Process Control
Author Marien Graham , Subhabrata Chakraborti
A unique approach to understanding the foundations of statistical quality control with a focus on the latest developments in nonparametric control charting methodologiesStatistical Process Control (SPC) methods have a long and successful history and have revolution....
Release Date 2019/04 -
Nonlinear H-Infinity Control, Hamiltonian Systems and Hamilton-Jacobi Equations
Author M.D.S. Aliyu
A comprehensive overview of nonlinear H∞ control theory for both continuous-time and discrete-time systems, Nonlinear H∞-Control, Hamiltonian Systems and Hamilton-Jacobi Equations covers topics as diverse as singular nonlinear H∞-control, nonlinear H∞ -filtering, mi....
Release Date 2017/12 -
Author Kevin D. Mitnick , Johnny Long
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically....
Release Date 2011/04 -
Author Becky Pinkard , Angela Orebaugh
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, ....
Release Date 2011/08 -
Nmap 6: Network Exploration and Security Auditing Cookbook
Author Paulino Calderon Pale
Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth.Master the power of Nmap 6Learn how the Nmap S....
Release Date 2012/11 -
Nine Steps to Success: North American edition - An ISO 27001 Implementation Overview
Author Alan Calder
Step-by-step guidance on a successful ISO 27001 implementation from an industry leader Resilience to cyber attacks requires an organization to defend itself across all of its attack surface: people, processes, and technology. ISO 27001 is the international standard....
Release Date 2017/10 -
Nine Steps to Success: An ISO27001:2013 implementation overview
Author Alan Calder
In Nine Steps to Success – An ISO 27001 Implementation Overview, Alan provides a comprehensive overview of how to lead a successful ISO 27001-compliant ISMS implementation in just nine steps. Show and hide more
Release Date 2016/05 -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
Newnes Guide to Digital TV, 2nd Edition
Author Richard Brice
The second edition has been updated with all the key developments of the past three years, and includes new and expanded sections on digital video interfaces, DSP, DVD, video servers, automation systems, HDTV, 8-VSB modulation and the ATSC system. Richard Bric....
Release Date 2002/10 -
Author Michael J. Panzner
To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market....
Release Date 2004/06