-
Introduction to Cryptography with Coding Theory, 3rd Edition
Author Lawrence C. Washington , Wade Trappe
None Show and hide more
Release Date -0001/11 -
Legal Competence in Environmental Health
Author Terence Moran
Legal Competence in Environmental Health assists the environmental health professional in understanding the operation of English law and navigating through some of its complexities. It covers those aspects of the work which are regulated by legal principles but not ....
Release Date 1997/11 -
The Manager's Pocket Guide to Preventing Sexual Harassment
Author Terry L. Fitzwater
Learn how to protect your employees as well as your company from sexual harassment. The Manager's Pocket Guide to Preventing Sexual Harassment approaches the issue globally, from creating policy statements on sexual harassment and conducting employee audits to dete....
Release Date 1998/01 -
Modern Control System Theory and Design, 2nd Edition
Author Stanley M. Shinners
The definitive guide to control system designModern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theor....
Release Date 1998/05 -
Advanced Modern Control System Theory and Design
Author Stanley M. Shinners
The definitive guide toadvanced control system designAdvanced Modern Control System Theory and Design offers the most comprehensive treatment of advanced control systems available today. Superbly organized and easy to use, this book is designed for an advanced cours....
Release Date 1998/09 -
The Manager's Pocket Guide to Employee Relations
Author Terry L. Fitzwater
This pocket guide is packed with insight and key skills for those new to the process of management or anyone needing new ideas and tools concerning relationship management. It provides survey materials to help managers evaluate and assess skills and policies in orde....
Release Date 1999/01 -
The Manager's Pocket Guide to Dealing with Conflict
Author Lois B. Hart
Conflicts occur everyday in the life of managers. You can't escape them, but you can learn how to handle them better. Conflict causes stress, low morale, and decreased productivity. This pocket guide is for leaders who want to learn skills that will prevent and res....
Release Date 1999/01 -
The Manager's Pocket Guide to Strategic and Business Planning
Author Stephen G. Haines
Another great title in the Managers Pocket Guide series ideal for anyone in a decisionmaking position. Enterprises in today's Global Information Age must keep up with rapid changes in technology while overhauling businesses, programs, and operations to meet the cha....
Release Date 1999/01 -
Fibre Channel for Mass Storage
Author Ralph H. Thornburgh
1022B-8Master Fibre Channel, the next-generation standard for enterprise storage!With Fibre Channel, you can suddenly scale your storage systems from gigabytes to terabytes, and improve performance at the same time -- all without disrupting systems, networks, or ap....
Release Date 1999/04 -
Concert Sound and Lighting Systems, 3rd Edition
Author John Vasey
Concert Sound and Lighting Systems provides comprehensive coverage of equipment and setup procedures for touring concert systems. The new edition will cover the new equipment now available and discuss other venues where the skills and technology are being use....
Release Date 1999/10 -
Network Performance Baselining
Author Daniel Nassar
Network Performance Baselining focuses on the real world implementation of network baselining principles and shows how to measure and rate a network's performance. It includes chapters that give a real "How To" approach for standard baseline methodologies along wit....
Release Date 2000/05 -
Building Internet Firewalls, 2nd Edition
Author D. Brent Chapman , Simon Cooper , Elizabeth D. Zwicky
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their product....
Release Date 2000/06 -
E-Mail Virus Protection Handbook
Author Syngress
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to profession....
Release Date 2000/11 -
Author John D. Drake
Who has never wished to step off the ever-accelerating treadmill of work, just to gain some kind of balance in life? Downshifting is a practical, hands-on guide that actually shows how to move from the fast track to a more satisfying, healthier, less work-focus....
Release Date 2001/01 -
Author Deborah E. Bouchoux
You can't touch it or feel it. Sometimes you can't even see it. Yet, intellectual property continues to soar in value, comprising an increasingly greater portion of a typical company's assets. In the age of instant global communication, understanding what intelle....
Release Date 2001/04 -
Teamwork Is an Individual Skill
Author Erin O. Murphy , Meri A. Walker , Christopher M. Avery
Knowing how to work effectively in and through groups may be the single most important skill anyone can develop in today's collaborative, team-based workplace. Unfortunately, all of the resources available on teamwork put the emphasis on group process and igno....
Release Date 2001/04 -
Author Eric Cole
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are ver....
Release Date 2001/08 -
Author Roger A. Grimes
Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, experts worried mostly about computer viruses that spread only through executable files, not data files, a....
Release Date 2001/08 -
Outsourcing Dilemma: The Search for Competitiveness, The
Author J. Brian Heywood
Outsourcing of some business functions pre-dates the technological revolution of the latter part of the 20th century. Nevertheless, 99 percent of outsourcing would not be logical or necessary if it were not for the constantly changing and improving technology.Despit....
Release Date 2001/09 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09 -
IP SANs: A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks
Author Tom Clark
"A concise guide to an exciting new technology that is bringing SANs into mainstream IP networking."--Jayshree Ullal, Group Vice President/General Manager, Cisco Systems"IP SANs provides a comprehensive overview of the next-generation storage area networks, with con....
Release Date 2001/11 -
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Author Russell Shumway , Dr. Eugene E. Schultz
This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with a....
Release Date 2001/11 -
Author Larry Cor , Jack Foster
Innovative, original ideas are a company's most powerful competitive advantage. Nathan Mhyrvold, former chief technology officer at Microsoft, has said that a great employee is worth 1,000 times more than an average one simply because of his or her ideas. In I....
Release Date 2001/11 -
Hack I.T.: Security Through Penetration Testing
Author Ajay Gupta , Scott Laliberte , T. J. Klevinsky
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previousl....
Release Date 2002/02 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
Free as in Freedom [Paperback]
Author Sam Williams
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a drivi....
Release Date 2002/03 -
Hack Proofing Your Network, 2nd Edition
Author Syngress
A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topi....
Release Date 2002/03 -
Network Security: Private Communication in a Public World, Second Edition
Author Charlie Kaufman , Radia Perlman , Mike Speciner
The classic guide to network security—now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanati....
Release Date 2002/04