Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
The Most Complete Guide to the 2011 NECThoroughly revised and expanded with hundreds of pages of new material to reflect changes in the 2011 NEC, McGraw-Hill’s National Electrical Code 2011 Handbook,
Declare "this " Make 2011 the year you pay "LESS" to the IRS Totally updated for 2011, "How to Pay Zero Taxes" lays out the simple, practical, and proven strategies that save you money at tax time-thi
Harnessing Autocad® Civil 3D® 2011, introduces readers to Autodesk® Civil 3D® 2011, the very latest release of this software. Strategically developed exercises printed
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materi
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You’ll get expert information on crucial proce
"Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete s
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
LOCK IN PDA SECURITY:* Let an IT security expert help you assess the PDA threat to your business* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobil
* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals speci
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strateg
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
Social security is at present the focus of an important economic and political debate. Is the combination of high taxes and high benefits distorting economic incentives? Can the social security syst
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market shareMuch has been written lately about the m
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
Written by an expert who has helped thousands of people nationwide find success as computer consultants, this is your complete guide to starting and managing a thriving computer and network consulting
Illustrates key computing concepts using examples in the most popular programming languages. This is an essential guide for the hundreds of thousands of students studying Introduction to Computer Scie
Not the results of the Survey at the End of the Universe, but a guide for security professionals to assessing in detail the security status, deficiencies and excesses, and needs of a client such as an
THE COMPUTER CONSULTANT'S GUIDEIf you're serious about striking out on your own as a computer consultant, you don't need a pep talk. You need reliable, authoritative information that will prepare you
This series is for people—adults and teenagers—who are interested in computer programming because it's fun. The three volumes use the Logo programming language as the vehicle for an exploration of com
In Great Ideas in Computer Science: A Gentle Introduction, Alan Biermann presents the "great ideas" of computer science that together comprise the heart of the field. He condenses a great d
"Ascertain the meaning before consulting this dictionary," warns the author of this collection of deliberately satirical misdefinitions. New computer cultures and their jargons have burgeoned since th
Blends basic computer science concepts and C language programming. The study of the language is presented as it applies to many different areas of computer science. This is the same book as Nagin whic
For anyone interested in the issues arising from computer malfunctions and, moreperniciously, from misuse, this new edition of Computer Ethics is right on the mark. Widelyacclaimed for its readability
An abridged and modified adaptation of Computer Graphics: Principles and Practice, 2nd ed. (Addison-Wesley, 1990), featuring new material and, in some cases, a different approach to exposition designe