The book is a one-stop source for cryptographic methods used in payment technologies in major glo...
The book provides a common operating framework in which best practices, process improvements, and...
This book examines both application and security architectures and illustrates the relationship b...
Most people do not truly understand a concept until they can visualize it. This applies to all fi...
This is the story of an up-and-coming project manager that has been handed a large program to lea...
A proliferation of new technologies has lulled many into thinking that we actually have to think ...
The modern field of software metrics emerged from the computer modeling and 'statistical thinking...
By definition, information security exists to protect your organization's valuable information re...
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network s...
Programmers can refer to Creating Components:Object Oriented, Concurrent, and Distributed Compu...
Ready technology is a new category of information technology (IT) that allows companies to rapidl...
This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protoc...