You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
IT management and staff are called upon to perform the almost-impossible tasks of evaluating, purchasing, integrating, and maintaining complex IT systems, and directing these systems to meet the ever-changing goals of an organization. Add to that the spending restraints of a down economy, and IT managers find themselves in need of a thoughtful, rea
In systems analysis, programming, development, or operations, improving productivity and service - doing more with less - is the major challenge. Regardless of your management level, the Handbook gives you the advice and support you need to survive and prosper in the competitive environment. It is the only comprehensive and timely source of technical and managerial guidance, providing expert information on the latest IT management techniques from top IS experts. This edition explains state-of-the-art technologies, innovative management strategies, and practical step-by-step solutions for surviving and thriving in today's demanding business environment. The IS Management Handbook outlines how to effectively manage, adapt and integrate new technology wisely, providing guidance from 70 leading IS management experts in every important area. This reference enables its readers to ensure quality, contain costs, improve end-user support, speed up systems development time, and solve rapidly changing business problems with today's IS technology.
Concurrency is a powerful technique for developing efficient and lightning- fast software. For instance, concurrency can be used in common applications such as online order processing to speed processing and ensure transaction reliability. However, mastering concurrency is one of the greatest challenges for both new and veteran programmers. Softwar
Strategic ERP Extension and Use is a compilation of the best in modern thought by established business leaders and research institutions on how unique ERP capabilities are being used today and what strategic opportunities they now provide to managers.
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.
A developer's knowledge of a computing system's requirements is necessarily imperfect because organizations change. Many requirements lie in the future and are unknowable at the time the system is designed and built. To avoid burdensome maintenance costs developers must therefore rely on a system's ability to change gracefully-its flexibility. Flex
This book walks readers through the process of setting up a secure E-commerce Web site. It includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Together, the authors and the reader develop a site from concept to implementation. The material makes use of numerous coding examples to illustrate how to use the most current technologies - from Microsoft, Sun, and others - to support secure transactions.
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable refer