You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This Information security classification book will help organizations establish effective security classification practices. It supplies readers with the understanding to ensure personal and confidential information is safe from unauthorized use and disclosure. It describes how to protect the intellectual property of an enterprise, how to facilitate the identification of information to support routine disclosure and active dissemination of information, how to facilitate the sharing of information with other enterprises; and how to ensure information that is shared between enterprises is adequately protected.
This book provides guidance on designing complex, highly available enterprise architectures that integrate the most critical aspects of an organization's business processes. Considering the lack of tolerance of enterprise for operational interruptions or the risks that accompany theft and loss of data, this reference describes how to ensure your organization is prepared for the unexpected. The text also aids in containing liability with guidance on network and application vulnerability assessments, intrusion detection and penetration testing, incident response planning, risk mitigation audits/reviews, and business continuity and disaster recovery planning.
This book covers the major categories of malware that infect your enterprise computer systems. The book defines the security principles that should be followed within the infrastructure and how you can determine an infected system on some of the most malicious software out there. Each chapter defines by type, the malicious software as an infectious "tool" used by the various sponsored and unsponsored hacking groups and individuals.
Securing against operational interruptions and the theft of your data is much too important to leave to chance. By planning for the worst, you can ensure your organization is prepared for the unexpected. Enterprise Architecture and Information Assurance: Developing a Secure Foundation explains how to design complex, highly available, and secure enterprise architectures that integrate the most critical aspects of your organization's business processes. Filled with time-tested guidance, the book describes how to document and map the security policies and procedures needed to ensure cost-effective organizational and system security controls across your entire enterprise. It also demonstrates ho...
Furnishes detailed, step-by-step instructions for designing, constructing, and programming ten innovative robots--including the Grabbot, Dragster, and The Hand--with detailed guidelines on how a NXT program works and its applications in the world of robotics. Original. (All Users)
Visual reference for North American raptors examines 17 hawks, falcons, eagles, and osprey--a must-have volume for carvers and others interested in these magnificent birds.
Jesus in the Gospels and Acts: Introducing the New Testament is a new edition of a popular text that has filled a market niche for books providing an easily accessible overview of Jesus in the New Testament. Content, layout, graphics, and reference updates enhance the appeal and educational value while making the resources more accessible. Jesus in the Gospels and Acts explores issues of authorship, historicity, culture, and theology through the perspectives of the four Gospels, the Acts of the Apostles, and the extracanonical gospels. Structured for a semester course, the book offers summaries, review questions, and recommended readings that make it ideal for classroom settings. Charts, maps, sidebars, and images offer the visual variety and graphic support essential to visual learners.