-
Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
Author Frederick D. Parker
The history of various aspects of the development of the U.S. Navy's communications intelligence structure and processes in the years leading up to the attack on Pearl Harbor. The history of various aspects of the deve....
Release Date 2013/10 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
SyncML®: Synchronizing and Managing Your Mobile Data
Author Phillipe Kahn , Peter Thompson , Apratim Purakayastha , Riku Mettälä , Uwe Hansmann
Discover SyncML, the new global standard for synchronizing virtually any mobile deviceCovers both the technical and business issuesCovers personal and enterprise applications, new mobile services, security, device management, and moreIncludes practical guidance for ....
Release Date 2002/09 -
Fibre Channel for Mass Storage
Author Ralph H. Thornburgh
1022B-8Master Fibre Channel, the next-generation standard for enterprise storage!With Fibre Channel, you can suddenly scale your storage systems from gigabytes to terabytes, and improve performance at the same time -- all without disrupting systems, networks, or ap....
Release Date 1999/04 -
Outsourcing Dilemma: The Search for Competitiveness, The
Author J. Brian Heywood
Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology.Despit....
Release Date 2001/09 -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
The Practice of Network Security: Deployment Strategies for Production Environments
Author Allan CISSP Liska
Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and fo....
Release Date 2002/12 -
Modern Cryptography: Theory and Practice
Author Wenbo Mao
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for applicat....
Release Date 2003/07 -
Malware: Fighting Malicious Code
Author Lenny Zeltser , Ed Skoudis
Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's thre....
Release Date 2003/11 -
Biometrics for Network Security
Author Paul Reid
The complete guide to implementing biometric security solutions for your networkNetwork security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers t....
Release Date 2003/12 -
Author Samir Palnitkar
Design Verification with eSamir PalnitkarWritten for both experienced and new users, DesignVerification with e gives you a broadcoverage of e. It stresses the practical verification perspective of e rather than emphasizing only itslanguage aspects.This book—Introduc....
Release Date 2003/09 -
Read Me First!: A Style Guide for the Computer Industry, Second Edition
Author Sun Technical Publications
The must-have reference for every technical writer, editor, and documentation manager—now fully updated!Read Me First! is the definitive guide to creating technical documentation that is clear, consistent, and easy to understand. Sun Microsystems' award-winning tec....
Release Date 2003/05 -
Hardware Design Verification: Simulation and Formal Method-Based Approaches
Author William K. Lam
The Practical, Start-to-Finish Guide to Modern Digital Design VerificationAs digital logic designs grow larger and more complex, functional verification has become the number one bottleneck in the design process. Reducing verification time is crucial to project succ....
Release Date 2005/03 -
Official Samba-3 HOWTO and Reference Guide, The
Author Jelmer R. Vernooij , John H. Terpstra
"The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of SambaThe practical, authoritative, step-by-st....
Release Date 2003/10 -
Weirdos in the Workplace: The New Normal… Thriving in the Age of the Individual
Author John Putzier - M.S. , SPHR
“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. Like it or not, the realities uncovered in this book are just that...real! And if you plan to be a significant player....
Release Date 2004/07 -
Data Protection and Information Lifecycle Management
Author Tom Petrocelli
The Definitive Guide to Protecting Enterprise DataYour enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and prote....
Release Date 2005/09 -
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Author Aviel D. Rubin , Steven M. Bellovin , William R. Cheswick
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the sec....
Release Date 2003/02 -
Hack I.T.: Security Through Penetration Testing
Author Ajay Gupta , Scott Laliberte , T. J. Klevinsky
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previousl....
Release Date 2002/02 -
IP SANs: A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks
Author Tom Clark
"A concise guide to an exciting new technology that is bringing SANs into mainstream IP networking."--Jayshree Ullal, Group Vice President/General Manager, Cisco Systems"IP SANs provides a comprehensive overview of the next-generation storage area networks, with con....
Release Date 2001/11 -
Effective Incident Response Team, The
Author Brian Moeller , Julie Lucas
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing com....
Release Date 2003/09 -
Web Hacking: Attacks and Defense
Author Shreeraj Shah , Saumil Shah , Stuart McClure
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, paymen....
Release Date 2002/08 -
Maximum Accessibility: Making Your Web Site More Usable for Everyone
Author Ph.D. John M. Slatin , Sharron Rush
Accessibility is now a legal requirement for all national government Web sites in the U.S., Canada, Australia, and the European Union. Throughout the world, many other organizations--universities, schools, and private companies--are recognizing that accessibility is....
Release Date 2002/09 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Author Lance Spitzner
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he....
Release Date 2002/09 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide
Author Dameon D. Welch-Abernathy
"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from ....
Release Date 2004/01 -
Windows Forensics and Incident Recovery
Author Harlan Carvey
Praise for Windows Forensics and Incident Recovery"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recomm....
Release Date 2004/07 -
The Tao of Network Security Monitoring Beyond Intrusion Detection
Author Richard Bejtlich
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners ....
Release Date 2004/07 -
Author Michael J. Panzner
To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market....
Release Date 2004/06