wyszukanych pozycji: 5
![]() |
Cloud Computing: Implementation, Management, and Security
ISBN: 9781439806807 / Angielski / Twarda / 2009 / 340 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives. The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing. They then survey some of the critical components that are... Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores... |
cena:
449,21 zł |
![]() |
Managing Software Deliverables: A Software Development Management Methodology
ISBN: 9781555583132 / Angielski / Miękka / 2003 / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Managing Software Deliverables describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need for these processes. In some instances, an organization may already have a PMO chartered with overall responsibility for each project managed in an enterprise. In those cases, this book will either provide validation of their efforts or it will provide some techniques and useful approaches that can be utilized to further...
Managing Software Deliverables describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) func...
|
cena:
500,15 zł |
![]() |
Wireless Operational Security
ISBN: 9781555583170 / Angielski / Miękka / 2004 / 468 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired...
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless...
|
cena:
595,40 zł |
![]() |
Business Continuity and Disaster Recovery for InfoSec Managers
ISBN: 9781555583392 / Angielski / Miękka / 2005 / 408 str. Termin realizacji zamówienia: ok. 18-20 dni roboczych. Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and... Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has be... |
cena:
290,22 zł |
![]() |
IM Instant Messaging Security
ISBN: 9781555583385 / Angielski / Miękka / 2005 / 432 str. Termin realizacji zamówienia: ok. 18-20 dni roboczych. There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM... There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterp... |
cena:
272,51 zł |