Sökt på: Böcker av James S. Tiller
totalt 13 träffar
Adaptive Security Management Architecture
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the …
Adaptive Security Management Architecture
For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But …
Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. …
Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and …
Ethical Hack
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to …
Albright's Chemical Engineering Handbook
Taking greater advantage of powerful computing capabilities over the last several years, the development of fundamental information and new models has led to major advances in …
Fatal News
What was "e;information"e; in the early eighteenth century, and what influence did the emergence of information, as potential physical and psychological threat, have on …
Ethical Hack
This book explains the methodologies, framework, and "e;unwritten conventions"e; that ethical hacks should employ to provide the maximum value to organizations that want to …
A Technical Guide to IPSec Virtual Private Networks
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to …
Technical Guide to IPSec Virtual Private Networks
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to …
CISO's Guide to Penetration Testing
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should …
CISO's Guide to Penetration Testing
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should …