Internet security expert Matt Curtin's book, Developing Trust: Online Privacy and Security is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
This comprehensive guide explores the management challenges of supervising and leading programmers. Author J. Hank Rainwater introduces new and not-so-new managers to concepts that will encourage them and help them become a strong leaders for their teams.
This book contrasts the application-centric development approach to the architecture-centric development approach, introducing the concept of the metamorphic superpatternthe capability of a software program to dynamically adapt to changing application requirements without rebuilding the binary executable.
Through the practical advice and lessons presented in this insightful guide, you'll gain valuable insight into the project management mind-set, to resolve real-world project situations and become more effective in your job.
Written with everyday users in mind, this practical book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
This guide is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to "harden" Windows NT, 2000, XP, and Server 2003 against them.
Securing SQL Server is one of the most important responsibilities of the SQL Server professional, and this carefully researched book offers solid advice on implementing good practices that will ward off future viruses before they are even created.
Although a book about computer security, this goes far beyond the usual "beware the dangers of chat rooms" warnings to teach you everything you need to know to protect your computer, your privacy, and yourself.
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle.