Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
When implemented correctly, release management can help ensure that quality is integrated throughout the development, implementation, and delivery of services, applications, and infrastructure. This h
The purpose of the Proliferation Security Initiative (PSI) is to prevent or at least inhibit the spread of weapons of mass destruction, their delivery systems, and related materials to or from states
All-in-One is All You NeedFully revised for the latest exam release, this authoritative volume offers thorough coverage of all the material on the Certified Information Systems Security Professional (
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
Written by the founder and executive director of the Quality Assurance Institute, which sponsors the most widely accepted certification program for software testingSoftware testing is a weak spot for
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
A guide to programming Symbian OS smartphones using OPL (The Open Programming Language): a simple to learn, open-source scripting language, ideal for fast-track development of enterprise applications.
Taking the mystery out of Six Sigma implementationThis easy-to-understand reference in the popular Demystified series teaches the methods of Six Sigma, explains their applications, and tests expertise
Over the past four decades computational methods in applied mechanics have developed into valuable tools that are widely used across both industry and academia. The applications are numerous: aerospac
Why Love Matters explains why love is essential to brain development in the early years of life, particularly to the development of our social and emotional brain systems, and presents the startling d
The last two decades in social work have seen tremendous strides in field research, from the development of improved research designs to more accurate methods of problem measurement and outcome analys
Create dynamic Web sites and applications using the functional power of Dreamweaver MX 2004. Web experts Tom Muck and Ray West walk you through Web site and application development using all the tools
What is this book about?The Apache Software Foundation's Jakarta Struts remains the most popular Java framework for building enterprise-level Web applications. In the first book to cover the extensive
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
Introduces the integrated Java development and deployment environment, offering an object-oriented approach to building Web and database applications, with detailed information on JDeveloper 9i IDE, g
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
Enter a New World of Database ProgrammingC# and ADO.NET facilitate the development of a new generation of database applications, including remote applications that run on the Web. Mastering C# Databas
XML is a powerful cross-platform mark-up language which has readily been adopted as a standard in many spheres of web and software development. Real benefits include its ease of integration into e
Immense potential for sustainable development lies in the production of fuels, chemicals, and materials from bioresources. This timely book provides comprehensive coverage of the engineering systems
The nature/nurture debate is not dead. Dichotomous views of development still underlie many fundamental debates in the biological and social sciences. Developmental systems theory (DST) offers a new c
Part of Preface to the second edition The main part of this book was written twenty years ago. The ideas and methods of symplectic geometry, developed in this book, have now found many applications in
* Storage systems are back-up data centers for vital information and a reliable second line of defense in the event a network is brought down* Security experts Chirillo and Blaul navigate the challeng
Drawn for the July 2002 conference on the Isle of Bendor, these 24 papers discuss memory BISYT analysis and applications, memory and soft errors, reliability in railway and automotive systems, embedde
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security
In recent years, creating dynamic, server-side web applications has become the most vital part of web development. Now, thanks to ASP.NET and Visual C#, you can build cleaner, more powerful web applic
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
From the authorized Oracle Press comes a complete guide to developing robust PL/SQL applications. The book contains new information on development tools, datatypes, SQL commands and functions, and muc
Learn to visualize a design for an application before it's built with help from this definitive guide. Focusing on the four most critical areas of software development--analysis, design, implementatio
Social security is at present the focus of an important economic and political debate. Is the combination of high taxes and high benefits distorting economic incentives? Can the social security syst
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
This book focuses on recent developments in representational and processing aspects of complex data-intensive applications. Until recently, information systems have been designed around different bu
Designing application and middleware software to run in concurrent and networked environments is a significant challenge to software developers. The patterns catalogued in this second volume of Patte
Subjects include formalism and its interpretation,analysis of simple systems, symmetries and invariance, methods of approximation, elements of relativistic quantum mechanics, much more. "Strongl
Understanding magnetic hysteresis is vitally important to the development of the science of magnetism as a whole and to the advancement of practical magnetic device applications. Magnetic Hysteresis,
Not the results of the Survey at the End of the Universe, but a guide for security professionals to assessing in detail the security status, deficiencies and excesses, and needs of a client such as an