"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
"Iran's rapidly advancing nuclear program may be the world's most important emerging international security challenge. Not only does Iran have confirmed nuclear capabilities, but the country also has
The authors of this volume explore the challenges of establishing democratic accountability and control over the military and other security establishments in countries which have either been the vict
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
Analysis of the security challenges presented by six states in the crucible of post-9/11 geopolitical change: Saudi Arabia, Syria, Iraq, Iran, Afghanistan, and Pakistan.
This book is invaluable to anyone facing the challenges of security in a business environment. --Paul D. Robertson, Moderator of Firewall-Wizards and Director of Risk Assessment, TruSecure Corporation
The increasing demand for energy, raw materials and goods arising from world population growth, the emerging concept of sustainable development is concerned with meeting such challenges. The widely ac
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
A foundation insider's guide to financial management challenges and solutionsFoundation Management represents the only single-volume reference to cover tried and true and emerging financial planning a
Men appear to be missing from much gender and development policy. However, emerging critiques suggest the need to pay more attention to understanding men and masculinities, and to analysing the social
Men appear to be missing from much gender and development policy. However, emerging critiques suggest the need to pay more attention to understanding men and masculinities, and to analysing the social
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
A practical and friendly guide to preparing for the golden years offers advice on investment portfolios, understanding 401Ks and investment plans, obtaining needed insurance, Social Security and Medic
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Editors Blessinger and Stockley present readers with a collection of academic essays and scholarly articles focused on contemporary and emerging trends and innovations in the doctoral education at uni
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
To lead good care, social care managers must have professional and personal authority: a clear understanding of the core task and the emotional challenges of care, and the imagination to create an org
This is the first complete, up-to-date, hands-on guide to creating effective information security policies and procedures. It introduces essential security policy concepts and their rationale, thoroug
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
A solid foundation of basic math skills is essential for early success in math. Children who can connect their understanding of math to the world around them will be ready for the challenges of mathem
A solid foundation of basic math skills is essential for early success in math. Children who can connect their understanding of math to the world around them will be ready for the challenges of mathem
A solid foundation of basic math skills is essential for early success in math. Children who can connect their understanding of math to the world around them will be ready for the challenges of mathem
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati