MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles

1 254 products

Advertisement

ISO/IEC 27001:2005 is an international standard for information security management systems (ISMSs). Closely allied to ISO/IEC 27002:2005 (which used to be known as ISO17799), this standard (sometimes called the ISMS standard) can
📱 Networking
18% OFF
Set up and administer a SharePoint Server 2007 environmentGet started on Microsoft Office SharePoint Server 2007 quickly and easily with help from this step-by-step guide. Using clear instructions, Microsoft Office SharePoint Server
📱 Networking
This book is about the past and future of research on the effectiveness of learning networks (also known as "e-learning" or "online learning" or "Web-based learning"). Learning networks are groups of people
📱 Networking
Today's enterprise cannot effectively function without a network, and today's enterprise network is almost always based on LAN technology. In a few short years, LANs have become an essential element of today's
📱 Networking
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive
📱 Networking
In response to an increasing demand for novel computing methods, Neural Networks for Applied Sciences and Engineering provides a simple but systematic introduction to neural networks applications. This book features case studies
📱 Networking
Cyberkids draws together research in the sociology of childhood and social studies of technology to explore children's experiences in the Information Age. The book addresses key policy debates about social inclusion and
📱 Networking
16% OFF
The Politics of Cyberspace provides an overview of the impact of the world wide web on the political process. Chris Toulouse organizes the articles according to their theoretical approach--those who take up
📱 Networking
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online! Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity
📱 Networking
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs)
📱 Networking
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection
📱 Networking
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there
📱 Networking
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.