Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
LOCK IN PDA SECURITY:* Let an IT security expert help you assess the PDA threat to your business* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobil
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materi
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market shareMuch has been written lately about the m
Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
"Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete s
* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals speci
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security
From the official Oracle Press comes a comprehensive guide to implementing a sound security plan in your Oracle environment. This expert resource explains how to secure the operating system, the datab
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
Not the results of the Survey at the End of the Universe, but a guide for security professionals to assessing in detail the security status, deficiencies and excesses, and needs of a client such as an
Written by acclaimed national terrorism expert Jonathan R. White, the market-leading TERRORISM AND HOMELAND SECURITY is widely recognized as the most comprehensive, balanced, and objective terrorism b
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
The .NET Framework offers new, more effective ways to secure your Web and LAN-based applications. .NET Development Security Solutions uses detailed, code-intensive examples—lots of them—to
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strateg
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
INTRUDER AT THE WHITE HOUSE When White House tour director Selena Barrow is attacked in her office, the Capitol K-9 Unit goes on high alert. Selena's cousin is a person of interest in a congressman's
INTRUDER AT THE WHITE HOUSE When White House tour director Selena Barrow is attacked in her office, the Capitol K-9 Unit goes on high alert. Selena's cousin is a person of interest in a congressman's
He was back from the deadand had a lot of explaining to do to his pregnant wifeWhen Sandy DuChaud's murdered husband shows up very much alive on her doorstep confessing he's an undercover Homeland Sec
He was back from the deadand had a lot of explaining to do to his pregnant wifeWhen Sandy DuChaud's murdered husband shows up very much alive on her doorstep confessing he's an undercover Homeland Sec
When three Middle Eastern terrorists, injected with a biological weapon, are unleashed on America, Special Agent Jericho Quinn, who answers only to the Director of National Intelligence and the U.S. P
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
CHERUB is an elite intelligence organization that employs agents under the age of seventeen. Because of their age, CHERUB agents have an unparalleled advantage in the realm of espionage. No one would