You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the C
Like no other book before it, Global Information Warfare illustrates the relationships and interdependencies of business and national objectives, of companies and countries, and of their dependence on advances in technology. This book sheds light on the "Achilles heel" that these dependencies on advanced computing and information technologies creat
The product of many years of practical experience and research in the software measurement business, this technical reference helps you select what metrics to collect, how to convert measurement data to management information, and provides the statistics necessary to perform these conversions. The author explains how to manage software development
Written by experienced process improvement professionals who have developed and implemented systems in organizations around the world, Interpreting the CMMI: A Process Improvement Approach provides you with specific techniques for performing process improvement using the CMMI and the family of CMM models. Kulpa and Johnson describe the fundamenta
Since 1993, the Information Security Management Handbook has served not only as an everyday reference for information security practitioners but also as an important document for conducting the intense review necessary to prepare for the Certified Information System Security Professional (CISSP) examination. Now completely revised and updated and i
Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. He contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons.
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastruc
Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security and proposes a new approach to more effectively restrain and manage cyberattacks.
Advances in networking and communications hardware based upon the TCP/IP protocol suite are opening up a new range of technologies with the potential to contribute considerably to our daily lives. The ABCs of TCP/IP is a comprehensive reference on the TCP/IP protocol suite for professionals that provides an overview of the suite and details its key components. It addresses virtual private networks, IP telephony and voice gateways, and IPSec and examines the manner by which various protocols and applications operate. Coverage also includes security techniques, routing, network design constraints, testing methods, troubleshooting, management issues, and emerging applications.
Unfortunately, much of what has been written about software engineering comes from an academic perspective which does not always address the everyday concerns that software developers and managers face. With decreasing software budgets and increasing demands from users and senior management, technology directors need a complete guide to the subject