-
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design
Author Paul Forbes , Jason Frazier , Lou Ronnau , Denise Helfrich
Cisco Network Admission ControlVolume I: NAC Framework Architecture and DesignA guide to endpoint compliance enforcementToday, a variety of security challenges affect all businesses regardless of size and location. Companies face ongoing challenges with the fight ag....
Release Date 2006/12 -
Network Security Assessment: From Vulnerability to Patch
Author Andrew Gold , Ken Pfeil , Steve Manzuik
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is uni....
Release Date 2006/12 -
Author Paul Crowley
CD and DVD Forensics will take the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corpo....
Release Date 2006/12 -
Author Andrew Mason
Cisco Firewall Technologies (Digital Short Cut)Andrew MasonISBN-10: 1-58705-329-2ISBN-13: 978-1-58705-329-0Cisco Firewall Technologies provides you with a no-nonsense, easy-to-read guide to different types of firewall technologies along with information on how these....
Release Date 2007/01 -
Business and Competitive Analysis: Effective Application of New and Classic Methods
Author Babette E. Bensoussan , Craig S. Fleisher
“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.” --Bill Fiora, Partner and Founder, Outward Insights “All practicing managers and bu....
Release Date 2007/02 -
Taming Heterogeneity and Complexity of Embedded Control
Author Salah Laghrouche , Elena Panteley , Antonio Loria , Françoise Lamnabhi-Lagarrigu
This book gathers together a selection of papers presented at the Joint CTS-HYCON Workshop on Nonlinear and Hybrid Control held at the Paris Sorbonne, France, 10-12 July 2006. The main objective of the Workshop was to promote the exchange of ideas and experiences an....
Release Date 2007/02 -
Understanding Government Contract Law
Author Terrance M. O'Connor
A “back-to-basics” guide to government contract lawFinally! A plain-English presentation of the basic legal concepts of government contract law for professionals at any stage in their careers.Until now, anyone in the procurement field has had to trudge through....
Release Date 2007/02 -
Author Dan Ablan
You hold in your hands the best-selling guide to NewTek's LightWave 3D animation software, completely updated for LightWave v9 by award-winning animator and trainer Dan Ablan. Rather than rehash the documentation like other books, this down-to-earth, easy-to-follow....
Release Date 2007/03 -
Author Mark S. Kadrich - CISSP
A Comprehensive, Proven Approach to Securing All Your Network Endpoints!Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert M....
Release Date 2007/03 -
Programming Mobile Devices: An Introduction for Practitioners
Author Tommi Mikkonen
With forewords by Jan Bosch, Nokia and Antero Taivalsaari, Sun Microsystems.Learn how to programme the mobile devices of the future!The importance of mobile systems programming has emerged over the recent years as a new domain in software development. The design of ....
Release Date 2007/03 -
Sarbanes-Oxley Ongoing Compliance Guide: Key Processes and Summary Checklists
Author Anne M. Marchetti
Quick and easy implementation and maintenance guide for ongoing Sarbanes-Oxley compliance For most companies, achieving compliance to the Sarbanes-Oxley Act (SOX) has proven to be more challenging, and more costly, than initially anticipated. In many cases, initial ....
Release Date 2007/03 -
Author Maryann Karinch , Gregory Hartley
Are you in business, journalism, law enforcement, or medicine?Do you face students in a classroom or criminals in a courtroom?Are you in a relationship or looking for one?Do you have children?Then you need the skills to read them like a book!I Can Read You Like a Bo....
Release Date 2007/03 -
ISO27001 Assessments Without Tears
Author Steve G. Watkins
The audit process can be a daunting one as an auditor can direct questions at any employee within your organisation. Written in a clear plain style, this pocket guide offers a tried and tested briefing, and should be issued to staff in advance of the audit to help t....
Release Date 2007/03 -
Practical Negotiating: Tools, Tactics & Techniques
Author Tom Gosselin
Praise for Practical Negotiating: Tools, Tactics & Techniques"Practical Negotiating is an innovative, resourceful, and-as its name implies-practical guide to the art and science of negotiating. Unlike many books on negotiating, which are filled with theories and....
Release Date 2007/05 -
Microsoft® Mobile Development Handbook
Author Peter Foot , Daniel Moth , Andy Wigley
Learn the essentials for developing mobile applications for any Windows-based mobile device. Focusing on proven techniques and practices, this guide addresses the real-world needs of experienced Microsoft Windows® mobile developers. Users are growing increasingly d....
Release Date 2007/05 -
Author Michael Gregg
CISA Exam PrepCertified Information Systems AuditorMichael GreggYour Complete Certification Solution!The Smart Way to Study™In This Book You’ll Learn How To:Approach the IS audit process from ISACA’s view of IS auditing best practicesRelate and apply information sec....
Release Date 2007/05 -
Author Alan Calder
An Introduction to IT GovernanceIf you are unsure what IT governance is, or how it is relevant to your business, this pocket guide is for you. It outlines the key drivers for IT governance in the modern global economy, with particular reference to corporate governan....
Release Date 2007/05 -
Risk Assessment for Asset Owners
Author Steve Watkins , Alan Calder
Understand ISO 38500: the standard for the corporate governance of ITISO/IEC38500 is the international standard for the corporate governance of information and communication technology. The purpose of the standard is to create a framework to ensure that the Board is....
Release Date 2007/05 -
Take Control of Syncing in Tiger
Author Michael E. Cohen
Learn how to synchronize all your data between Macs, or with mobile phones, PDAs, and iPods!Frustrated in your attempts to synchronize data between your Macs, or with other devices? Michael E. Cohen is here to help. With clear directions and a humorous touch, his 13....
Release Date 2007/05 -
Take Control of What’s New in Entourage 2004
Author Tom Negrino
You can take control of Entourage 2004, Microsoft's powerful email client and project manager! If you use Entourage 2004 (or are considering upgrading), you need this ebook to make the most of Entourage's new and enhanced features. Learn how to ban spam from your ....
Release Date 2007/05 -
CIBSE Guide H: Building Control Systems
Author Cibse
'Building Control Systems' provides the building services engineer with a comprehensive understanding of modern control systems and relevant information technology. This will ensure that the best form of control systems for the building is specified and that....
Release Date 2007/06 -
Linksys® WRT54G Ultimate Hacking
Author Paul Asadoorian , Larry Pesce
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different....
Release Date 2007/06 -
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Author Dominique Paret
Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electron....
Release Date 2007/07 -
Security Monitoring with Cisco Security MARS
Author Greg Kellogg , Gary Halleen
Security Monitoring with Cisco Security MARSThreat mitigation system deploymentGary HalleenGreg KelloggNetworks and hosts are probed hundreds or thousands of times a day in an attempt to discover vulnerabilities. An even greater number of automated attacks from worm....
Release Date 2007/07 -
Author Barry Oshry
In this extensively revised and updated edition of his classic book, Barry Oshry shows how we can transform “system blindness” into “system sight,” enabling us to live and work together in productive partnership. Based on more than thirty years of research and ....
Release Date 2007/08 -
Cisco NAC Appliance: Enforcing Host Security with Clean Access
Author Alok Agrawal , Chad Sullivan - CCIE No. 6493 , Jerry Lin - CCIE No. 6469 , Jamey He
Cisco NAC ApplianceEnforcing Host Security with Clean AccessAuthenticate, inspect, remediate, and authorize end-point devices using Cisco NAC ApplianceJamey Heary, CCIE® No. 7680Contributing authors: Jerry Lin, CCIE No. 6469,Chad Sullivan, CCIE No. 6493, and Alok Ag....
Release Date 2007/08 -
End-to-End Network Security: Defense-in-Depth
Author Omar Santos
End-to-End Network SecurityDefense-in-DepthBest practices for assessing and improving network defenses and responding to security incidentsOmar SantosInformation security practices have evolved from Internet perimeter protection to an in-depth defense model in which....
Release Date 2007/08 -
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition
Author David Huca - CCIE No. 4594
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest firewall releases, this book helps you to quickly and easily config....
Release Date 2007/08 -
Adobe ColdFusion 8 Web Application Construction Kit, Volume 1: Getting Started
Author Charlie Arehart , Raymond Camden , Ben Forta
The ColdFusion Web Application Construction Kit is the best-selling ColdFusion series of all time—the books that most ColdFusion developers used to learn the product. This Getting Started volume starts with Web and Internet fundamentals and database concepts and des....
Release Date 2007/09 -
Author Michael Rash
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor ne....
Release Date 2007/09