The Waves is one of the greatest achievements in modern literature. Commonly considered the most important, challenging and ravishingly poetic of Virginia Woolf's novels, it was in her own estimation 'the most complex and difficult of all my books'. This edition will be the most authoritative, most [...]
Once recalled only for The Whig Interpretation of History (1931) and Christianity and History (1949), Sir Herbert Butterfield's contribution to western culture has undergone an astonishing revaluation over the past twenty years. What has been left out of this reappraisal is the man himself. Yet the [...]
On 25th July, breaking news revealed that Michael Jackson, King of Pop, was dead. Fans and the media watched in shock as the story unfolded: doctors had lost the battle to save him after he had collapsed from a heart attack. In a cruel twist of fate, he had passed away before he got the chance to ma[...]
In the early 1950s, an eleven-year-old boy in Colombo boards a ship bound for England. At mealtimes he is seated at the "cat's table" as far from the Captain's Table as can be with a ragtag group of "insignificant" adults and two other boys. As the narrative moves between the decks and holds of th[...]
Firewalls are among the best-known network security tools in use today. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software and related tools. This title explores firewalls in the context [...]
"Guide To Network Security, International Edition" is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with[...]
PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 2E, International Edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage. From market-leading content on contingency planning, to effective techniques that minimize down[...]
Beginning with the foundational and technical components of information security, this title focuses on access control models, information security governance, and information security program assessment and metrics.[...]
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus[...]
A work from Cengage Learning on "Hands-On Information Security Lab Manual".
A work from Cengage Learning on "Readings & Cases in Information Security: Law & Ethics".
A book on Roadmap to Information Security: For IT and Infosec Managers.
Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information securi[...]
(Vocal Selections). This highly anticipated blockbuster stars Hugh Jackman, Russell Crowe and Anne Hathaway. Our songbook features piano/vocal selections of 16 songs from the film, including the new title "Suddenly," plus beautiful full-color art from the movie throughout as well as introduction by [...]