-
A Practical Guide to Security Assessments
Author Sudhanshu Kairab
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this w....
Release Date 2004/09 -
The Broadcast Century and Beyond, 4th Edition
Author Michael C Keith , Robert L Hilliard
The Broadcast Century and Beyond, 4th Edition, is a popular history of the most influential and innovative industry of the previous and current century. The story of broadcasting is told in a direct and informal style, blending personal insight and authoritative sch....
Release Date 2004/10 -
Author James M. Stewart
Get the streamlined tool you need to bone up for the Security+ exam [SYO-101]. Fast Pass coverage includes:General security concepts.Assessing risk.Securing communications.Implementing wireless security features.Configuring a firewall.Detecting intrusions.Securing y....
Release Date 2004/10 -
Cisco QOS Exam Certification Guide (IP Telephony Self-Study), Second Edition
Author Michael J. Cavanaugh , Wendell CCIE No. 1624 Odom
Official self-study test preparation guide for the Cisco QOS 642-642 exam. The official study guide helps you master all the topics on the QOS exam, includingQoS concepts, tools, and architecturesModular QoS CLI (MQC), QoS Policy Manager (QPM), and AutoQoSClassifica....
Release Date 2004/11 -
The Business Case For Network Security: Advocacy, Governance, And Roi
Author Warren Saxe , Catherine Paquet
Understand the total cost of ownership and return on investment for network security solutionsUnderstand what motivates hackers and how to classify threatsLearn how to recognize common vulnerabilities and common types of attacksExamine modern day security systems, d....
Release Date 2004/12 -
Author George Varghese
In designing a network device, you make dozens of decisions that affect the speed with which it will perform—sometimes for better, but sometimes for worse. Network Algorithmics provides a complete, coherent methodology for maximizing speed while meeting your other d....
Release Date 2004/12 -
The Money Markets Handbook: A Practitioner's Guide
Author Moorad Choudhry
In The Money Markets Handbook Moorad Choudhry provides, in one comprehensive volume, the description, trading, analysis and calculations of the major markets around the world, providing worked examples and exercises throughout to provide a landmark publication on th....
Release Date 2005/01 -
Boards That Deliver: Advancing Corporate Governance From Compliance to Competitive Advantage
Author Ram Charan
Finally, a book that brings the vision of truly good governance down to earth. Ram Charan, expert in corporate governance and best-selling author, packs this book with useful tools and techniques to take boards and their companies to a higher level of performance. C....
Release Date 2005/02 -
Hardware Design Verification: Simulation and Formal Method-Based Approaches
Author William K. Lam
The Practical, Start-to-Finish Guide to Modern Digital Design VerificationAs digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project succ....
Release Date 2005/03 -
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Author Kevin D. Mitnick , William L. Simon
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestsellingThe Art of DeceptionKevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malici....
Release Date 2005/03 -
Author Justin Clarke , Nitesh Dhanjani
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. ....
Release Date 2005/04 -
Author Keith Mortier , Allen Keele
Want an affordable yet innovative approach to studying for the Certified Information Systems Auditor (CISA) 2005 exam? CISA 2005 Exam Cram 2 is your solution. You will have the essential material for passing the CISA 2005 exam right at your fingertips. All exam obje....
Release Date 2005/04 -
IT Governance: Guidelines for Directors
Author Alan Calder
A director's guide to IT governanceThis book is an essential read for those sitting on the board of any organisation that wants to secure its information, its intellectual property and its competitive advantage.Written for a non-technical, commercially-minded audie....
Release Date 2005/04 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
Securing Your Business with Cisco ASA and PIX Firewalls
Author Greg Abelar
Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent Understand how attacks can impact your business and the different ways attacks can occurLearn about the defense-in-depth model for deploying firewall and host protectionExamine naviga....
Release Date 2005/05 -
E-Health Care Information Systems: An Introduction for Students and Professionals
Author Joseph Tan
E-Health Care Information Systems is a comprehensive collection written by leading experts from a range of disciplines including medicine, health sciences, engineering, business information systems, general science, and computing technology. This easily followed tex....
Release Date 2005/05 -
Cisco ASA and PIX Firewall Handbook
Author Dave Huca
The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security featuresLearn about the various firewall models, user interfaces, feature sets, and configuration methodsUnderstand how a Cisco firewall inspects trafficConfigure firewall inter....
Release Date 2005/06 -
Author Chad Sullivan
Prevent security breaches by protecting endpoint systems with Cisco Security Agent, the Cisco host Intrusion Prevention SystemSecure your endpoint systems with host IPSBuild and manipulate policies for the systems you wish to protectLearn how to use groups and hosts....
Release Date 2005/06 -
Author Michael Morrison
Wish your BlackBerry 7100 had come with a little more meat in the owner's manual? BlackBerry 7100 In a Snap is your wish come true. This task-oriented guide goes well beyond the BlackBerry 7100 owner's manual and guides you through its devices using practical usag....
Release Date 2005/07 -
Author Department Delhi Department of English University of Delhi
The Individual and Society: Essays, Stories and Poems is prescribed for the BA English (Discipline) course 'The Individual and Society', the concurrent inter-disciplinary course of the BA Honours programme, and the B.Com Honours Programme. The anthology consists o....
Release Date 2005/08 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Linux Firewalls, Third Edition
Author Robert Ziegler , Steve Suehring
An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first t....
Release Date 2005/09 -
Author Michael Gregg
A new edition of this title is available, ISBN-10: 0789738066 ISBN-13: 9780789738066Learn what you need to know to master the CISSP security technology and the certification exam with the CISSP Exam Cram 2. A perfect compliment to larger study guides, the CISSP Exam....
Release Date 2005/09 -
Author Robert C. Seacord
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specif....
Release Date 2005/09 -
Business Continuity and Disaster Recovery for InfoSec Managers
Author James F. Ransome , PhD , CISM , CISSP , John Rittinghouse , PhD , CISM
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses t....
Release Date 2005/09 -
Author Maryann Karinch , Gregory Hartley
An International Spy Museum Bestseller!Have you ever been lied to? Of course you have, whether you knew it or not.Ever caught a spouse, business partner, parent, boss, or child brazenly lying right to your face? What if you could tell someone was lying, just by list....
Release Date 2005/09 -
Author Dave Mabe
The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than ....
Release Date 2005/10 -
Penetration Testing and Network Defense
Author Daniel P. Newman , Andrew Whitaker
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plansLearn to perform social engineering and host reconnaissanceEvaluate session hijacking methodsExploit web server vulnerabilitiesDetect attempts to breach ....
Release Date 2005/10 -
The Official Adobe Print Publishing Guide, Second Edition
Author Brian P. Lawler
THE KEY TO SUCCESSFUL PRINT PRODUCTION is an understanding of the entire workflow, from scanning and file creation through prepress and print production. Fully updated by author and publishing consultant Brian Lawler, The Official Adobe Print Publishing Guide, Secon....
Release Date 2005/10 -
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
Author Madjid Nakhjiri , Mahsa Nakhjiri
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services.AAA and Network Security for Mobile Access is an invalua....
Release Date 2005/10