The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals speci
Once there was a dream of a cloud, waiting, hiding, in a blue sky, which became a whisper of white and grew and grew . . . Everybody loves looking at the little white cloud as it makes all sorts of in
Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling p
Freddie and Gingersnap meet a cloud. It's a peculiar cloud. It sings a song. It asks questions. It knows magic. And Freddie wants to keep it. . .but Gingersnap knows you can't keep a cloud. Or could y
Emphasizing the four primary goals of computer security--confidentiality, authentication, integrity, and non-repudiation--this helpful handbook provides a detailed tutorial on data security models tha
Certification Prep Adobe Flash Creative Cloud helps you prepare to take the Adobe Certified Associate (ACA) Adobe Flash CC certification exam. G-W’s Certification Preparation Series consists of indivi
Certification Adobe Illustrator Creative Cloud helps you prepare to take the Adobe Certified Associate (ACA) Adobe Illustrator CC certification exam. G-W’s Certification Preparation Series consists of
Start your Word Cloud Classics collection with adventures from some of the most popular authors in classic literature. Bram Stoker, Mark Twain, Sir Arthur Conan Doyle, Charles Dickens, the Brothers Gr
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
In this funny and tender picture book for the youngest child, a fluffy cloud gets a job (with the help of his friend the police helicopter) as a police officer. But no matter how hard he tries, the qu
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
* Storage systems are back-up data centers for vital information and a reliable second line of defense in the event a network is brought down* Security experts Chirillo and Blaul navigate the challeng
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
Spring Cloud是集微服務框架大成的超值套件Docker是終極高效輕量級虛擬化的雲端超容器一個實例貫穿Spring Cloud、微服務架構以及與Docker整合,一試就能上手掌握架構基礎與應用技術。本書特色隨著業務的發展、程式的堆砌,公司專案變得日益臃腫、複雜、開發效率低落、難以維護?我們迫切需要能夠解放生產力的新技術──微服務架構Spring Cloud!作者為Spring Cloud社區創辦者之一,以實戰開發者之豐富經驗,將設定簡單、設計優雅的Spring Cloud所有相關的基礎知識和工具的使用,在本書中進行完整而精闢的剖析;最後則說解了如何將Spring Cloud微服務應用部署運行在Docker上,讓架構系統得予快速、輕鬆且高效運用。精彩內容本書涵蓋了微服務理論、開發框架(Spring Cloud)以及執行平台(Docker)三大主題。❑ Part 1(第1章):有系統的介紹微服務架構。❑ Part 2(第2-11章):使用Spring Cloud開發框架編寫一個「電影售票系統」。❑ Part 3(第12-14章):說明如何將微服務實際執行在Docker平台上。全書採用精心設計的Demo驅動,以連貫的場景、真實的程式範例,來引導讀者學習如何使用強大的微服務技術實現架構設計。本書涵蓋最新版本架構所獨具的技術特性、技巧及案例,幫助讀者避開升級過程中可能遭遇到的困難與陷阱。更多理論性的內容(如Cloud Native、12-factor APP、DDD等)在文中皆以「延伸閱讀」、「Tips」或「Warning」的形式註記,提供有興趣的讀者依此專研,擴展視野。適用讀者群Java工程師、系統架構師和運行維護人員,以及對 Spring Cloud 有興趣的技術同好。
✤本書特色:隨著業務的發展、程式的堆砌,公司專案變得日益臃腫、複雜、開發效率低落、難以維護?我們迫切需要能夠解放生產力的新技術──微服務架構Spring Cloud!作者為 Spring Cloud 社區的創辦者之一,以實戰開發者的豐富經驗,將設定簡單、設計優雅的 Spring Cloud 所有相關的基礎知識和工具的使用,做完整而精闢的剖析。✤精彩內容:本書涵蓋了微服務理論、開發框架 (Sprin
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
The issues and profession of the Chief Data Officer (CDO) are of significant interest and relevance to organisations and data professionals internationally. Written by two practicing CDOs,
Home—in the island village of Cloud Bay—is where the heart is. . . Leah Santelli always knew that Zach Harper, son of a rock legend and her best friend’s brother, was painfully out of reach. The
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
Data Handling and Analysis provides a broad review of the quantitative skills needed to be an effective biomedical scientist. Spanning the collection, presentation, and analysis of data - and drawing
This is the first complete, up-to-date, hands-on guide to creating effective information security policies and procedures. It introduces essential security policy concepts and their rationale, thoroug