In recent decades, new pathogens such as HIV, the Ebola virus, and the BSE prion have emerged, while old scourges such as tuberculosis, cholera, and malaria have grown increasingly resistant to treatm
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
This is the first complete, up-to-date, hands-on guide to creating effective information security policies and procedures. It introduces essential security policy concepts and their rationale, thoroug
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
Microsoft's Web Services Development Kit (WSDK) brings to the table infrastructure protocols with standards to solve Web services problems such as security and scalabilityThis book will be the first a
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
Social security is at present the focus of an important economic and political debate. Is the combination of high taxes and high benefits distorting economic incentives? Can the social security syst
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market shareMuch has been written lately about the m
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
Not the results of the Survey at the End of the Universe, but a guide for security professionals to assessing in detail the security status, deficiencies and excesses, and needs of a client such as an
《建國方略》是孫文於1917年至1920年期間完成的3本著作的合訂本。它們分別是: (1)心理建設 《孫文學說》於 1919年完稿;(2)物質建設 《實業計畫》 原以英文發表,於1920年完稿,1921年出中文本並加序,英文本名為《The International Development of China》;(3)社會建設《民權初步》 於1917年完稿,原名《會議通則》。
Overviews Internet security for organizations, without getting into micro-level details of implementation. Shows how to analyze a company's systems in terms of security risks, and explains how to des
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
Central Asia in a Reconnecting Eurasia: Turkmenistan's Evolving Foreign Economic and Security Interests, part of a five-volume series, examines the full scope of U.S. national interests in Turkmenista