The simple act of offering a kind word or two can have power to change lives in positive and profound ways.In TEN POWERFUL PHRASES FOR POSITIVE PEOPLE, DeVos focuses each chapter on one key phrase, su
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
The simple act of offering a kind word or two can have power to change lives in positive and profound ways. In TEN POWERFUL PHRASES FOR POSITIVE PEOPLE, DeVos focuses each chapter on one key phrase,
A thorough and up-to-date guide to putting positive psychology into practice From the Foreword: "This volume is the cutting edge of positive psychology and the emblem of its future." -Martin E. P. Se
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
For fans of Craig Johnson and James Lee Burke—False Positive follows up the powerful punch of Andrew Grant’s novelRUN with a staggering second dose of thrills and suspense that is just as smart, atmos
The surprising evidence against the power of positive thinking?and what we should all do instead Based on her twenty years of scientific research into motivation, Gabriele Oettingen argues that
This is the first complete, up-to-date, hands-on guide to creating effective information security policies and procedures. It introduces essential security policy concepts and their rationale, thoroug
Compton (psychology, Middle Tennessee State U.) and Hoffman (psychology, Yeshiva U.) explain positive psychology in chapter one, which is followed by chapters covering the following: emotion, motivati
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
From David Feherty, the notorious? ex-pro and golf commentator at CBS Sports, comes a hilarious new collection of rants sure to surprise and crack up hackers everywhere. In The Power of Positive Idioc
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materi
"Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete s
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
LOCK IN PDA SECURITY:* Let an IT security expert help you assess the PDA threat to your business* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobil
Meyer, the bestselling author of over 53 inspirational books, presents a book on being positive. Includes full-color interiors, a ribbon marker, and a padded case cover.
* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals speci