Seems you have not registered as a member of go-pdf.online!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

CISO Leadership
  • Language: en
  • Pages: 312

CISO Leadership

  • Type: Book
  • -
  • Published: 2007-12-22
  • -
  • Publisher: CRC Press

Caught in the crosshairs of “Leadership” and “Information Technology”, Information Security professionals are increasingly tapped to operate as business executives. This often puts them on a career path they did not expect, in a field not yet clearly defined. IT training does not usually includemanagerial skills such as leadership, team-building, communication, risk assessment, and corporate business savvy, needed by CISOs. Yet a lack in any of these areas can short circuit a career in information security. CISO Leadership: Essential Principles for Success captures years of hard knocks, success stories, and yes, failures. This is not a how-to book or a collection of technical data. I...

Official (ISC)2 Guide to the CISSP CBK
  • Language: en
  • Pages: 1112

Official (ISC)2 Guide to the CISSP CBK

  • Type: Book
  • -
  • Published: 2006-11-14
  • -
  • Publisher: CRC Press

The urgency for a global standard of excellence for those who protect the networked world has never been greater. (ISC)2 created the information security industry’s first and only CBK®, a global compendium of information security topics. Continually updated to incorporate rapidly changing technologies and threats, the CBK continues to serve as the basis for (ISC)2’s education and certification programs. Unique and exceptionally thorough, the Official (ISC)2® Guide to the CISSP®CBK®provides a better understanding of the CISSP CBK — a collection of topics relevant to information security professionals around the world. Although the book still contains the ten domains of the CISSP, so...

Computer Security
  • Language: en
  • Pages: 132

Computer Security

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research ...

Information Security Management Handbook
  • Language: en
  • Pages: 578

Information Security Management Handbook

  • Type: Book
  • -
  • Published: 2004-12-28
  • -
  • Publisher: CRC Press

Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and in its fifth edition, the handbook maps the ten domains of the Information Security Common Body of Knowledge and provides a complete understanding of all the items in it. This is a ...must have... book, both for preparing for the CISSP exam and as a comprehensive, up-to-date reference.

The ABCs of LDAP
  • Language: en
  • Pages: 440

The ABCs of LDAP

  • Type: Book
  • -
  • Published: 2003-11-13
  • -
  • Publisher: CRC Press

Until now, it has been difficult to find the right source of information on LDAP and directory server implementations: books on the subject are overly product-specific, and a search on the Web results in information overload. The ABCs of LDAP: How to Install, Run, and Administer LDAP Services strikes the right balance, providing a synopsis of LDAP fundamentals without getting wrapped up in one particular implementation. This book is for network and systems administrators who want to begin using LDAP more extensively. It delivers the theoretical background needed to understand how these servers work, resulting in clear, concise examples of implementations in both commercial and OpenLDAP envir...

IS Management Handbook
  • Language: en
  • Pages: 808

IS Management Handbook

  • Type: Book
  • -
  • Published: 1999-10-28
  • -
  • Publisher: CRC Press

In systems analysis, programming, development, or operations, improving productivity and service - doing more with less - is the major challenge. Regardless of your management level, the Handbook gives you the advice and support you need to survive and prosper in the competitive environment. It is the only comprehensive and timely source of technical and managerial guidance, providing expert information on the latest IT management techniques from top IS experts. This edition explains state-of-the-art technologies, innovative management strategies, and practical step-by-step solutions for surviving and thriving in today's demanding business environment. The IS Management Handbook outlines how to effectively manage, adapt and integrate new technology wisely, providing guidance from 70 leading IS management experts in every important area. This reference enables its readers to ensure quality, contain costs, improve end-user support, speed up systems development time, and solve rapidly changing business problems with today's IS technology.

Investigator's Guide to Steganography
  • Language: en
  • Pages: 240

Investigator's Guide to Steganography

  • Type: Book
  • -
  • Published: 2003-10-27
  • -
  • Publisher: CRC Press

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable refer

Server Disk Management in a Windows Environment
  • Language: en
  • Pages: 280

Server Disk Management in a Windows Environment

  • Type: Book
  • -
  • Published: 2003-09-26
  • -
  • Publisher: CRC Press

Hard drives and disk management receive scant attention from the industry press, yet recent surveys have identified disk failure as the #1 source of server downtime. Combine this fact with the skyrocketing TCO of data storage management, and it is apparent that server disk management is a subject deserving of much more scrutiny. Server Disk Management in a Windows Environment explains the basic elements of disks and disk architectures, and explores how to successfully manage and maintain functionality within a Windows environment. The author focuses on critical issues that are often ignored by other books on this subject, issues including disk quotas, fragmentation, optimization, hard drive ...

Building A Global Information Assurance Program
  • Language: en
  • Pages: 424

Building A Global Information Assurance Program

  • Type: Book
  • -
  • Published: 2017-07-27
  • -
  • Publisher: CRC Press

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are

Computer Telephony Integration
  • Language: en
  • Pages: 432

Computer Telephony Integration

  • Type: Book
  • -
  • Published: 2002-12-17
  • -
  • Publisher: CRC Press

Since the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies