Information Technology

Per Page:
Sort:
PCI Compliance: The Definitive Guide

PCI Compliance: The Definitive Guide

Featured

Abhay Bhargav

May 5, 2014

Although organizations that store, process, or transmit cardholder information are required to comply with payment card industry standards, most find it extremely challenging to comply with and meet the requirements of these technically rigorous standards. PCI Compliance: The Definitive Guide explai...

The Influential Project Manager: Winning Over Team Members and Stakeholders

The Influential Project Manager: Winning Over Team Members and Stakeholders

Featured

Alfonso Bucero,MSc,PMP, PMI-RMP, PMI F

July 25, 2014

If you want to be a successful project manager, you need to become a person of influence. Without influence, there can be no success as a project manager. And, although all key success criteria point to the importance of developing soft skills as a project manager, few books exist about how to devel...

Project Leadership: Creating Value with an Adaptive Project Organization

Project Leadership: Creating Value with an Adaptive Project Organization

Featured

Barry L. Cross, M. Kathryn Brohman

July 1, 2014

Look around your organization: can you identify who owns project management? Would that person appreciate that they own responsibility for your projects? Project Leadership: Creating Value with an Adaptive Project Organization highlights the importance of these questions—underlining the importance...

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Featured

Rafay Baloch

July 28, 2014

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking t...

Physical Security and Safety: A Field Guide for the Practitioner

Physical Security and Safety: A Field Guide for the Practitioner

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

October 29, 2014

How-To Guide Written By Practicing Professionals Physical Security and Safety: A Field Guide for the Practitioner introduces the basic principles of safety in the workplace, and effectively addresses the needs of the responsible security practitioner. This book provides essential knowledge on the...

Hardware Security: Design, Threats, and Safeguards

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty

October 28, 2014

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

Software and Systems Architecture in Action

Software and Systems Architecture in Action

Raghvinder S. Sangwan

October 27, 2014

Modern-day projects require software and systems engineers to work together in realizing architectures of large and complex software-intensive systems. To date, the two have used their own tools and methods to deal with similar issues when it comes to the requirements, design, testing, maintenance,...

Android Malware and Analysis

Android Malware and Analysis

Ken Dunham

October 24, 2014

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware...

Project Health Assessment

Project Health Assessment

Paul S. Royer, PMP

October 24, 2014

Project managers, sponsors, team members, and involved stakeholders know when things aren’t going well. A frequent first indication is a missing or errant process. Project Health Assessment presents an innovative approach for assessing project processes through a set of ten critical success factors...

High Performance Parallel I/O

High Performance Parallel I/O

Prabhat, Quincey Koziol

October 23, 2014

Gain Critical Insight into the Parallel I/O Ecosystem Parallel I/O is an integral component of modern high performance computing (HPC), especially in storing and processing very large datasets to facilitate scientific discovery. Revealing the state of the art in this field, High Performance...

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

Rebecca Herold, Kevin Beaver

October 20, 2014

Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the...

Portfolio Management: A Strategic Approach

Portfolio Management: A Strategic Approach

Ginger Levin, PMP, PgMP, John Wyzalek, PfMP

October 15, 2014

Recognizing the importance of selecting and pursuing programs, projects, and operational work that add sustainable business value that benefits end users, the Project Management Institute (PMI®) issued its first Standard on Portfolio Management in 2006. In 2014, it launched the Portfolio Management...

Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript

Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript

J. D. Glaser

October 13, 2014

The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security. Establishing mobile software...

The Essential Guide to Serial ATA and SATA Express

The Essential Guide to Serial ATA and SATA Express

David A. Deming

October 09, 2014

Used in laptop and desktop computers, low-end servers, and mobile devices, Serial ATA (Advance Technology Attachment), or SATA, is the pervasive disk storage technology in use today. SATA has also penetrated the enterprise computing environment by adding hardware components for fail-over, extending...

Software Metrics: A Rigorous and Practical Approach, Third Edition

Software Metrics: A Rigorous and Practical Approach, Third Edition

Norman Fenton, James Bieman

October 01, 2014

A Framework for Managing, Measuring, and Predicting Attributes of Software Development Products and ProcessesReflecting the immense progress in the development and use of software metrics in the past decades, Software Metrics: A Rigorous and Practical Approach, Third Edition provides an up-to-date,...

The Strategic Project Leader: Mastering Service-Based Project Leadership, Second Edition

The Strategic Project Leader: Mastering Service-Based Project Leadership, Second Edition

Jack Ferraro

September 26, 2014

As executives build and nurture their organization’s strategic agility in today’s turbulent, uncertain business environment, the ability to lead strategic change has become more critical than ever. The Strategic Project Leader: Mastering Service-Based Project Leadership, Second Edition will help...