Despite his protests, Anne Gilchrist, distinguished woman of letters, moved her entire household from London to Philadelphia in an effort to marry him. John Addington Symonds, historian and theorist of sexual inversion, sent him avid fan mail for twenty years. And volunteer assistant Horace Traubel [...]
The fourth edition of "Principles of Information Security" explores the field of information security and assurance with updated content including new innovations in technology and methodologies. Students will revel in the comprehensive coverage that includes a historical overview of information sec[...]
Firewalls are among the best-known network security tools in use today. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software and related tools. This title explores firewalls in the context [...]
"Guide To Network Security, International Edition" is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with[...]
PRINCIPLES OF INCIDENT RESPONSE & DISASTER RECOVERY, 2E, International Edition presents methods to identify vulnerabilities within computer networks and the countermeasures that mitigate risks and damage. From market-leading content on contingency planning, to effective techniques that minimize down[...]
Beginning with the foundational and technical components of information security, this title focuses on access control models, information security governance, and information security program assessment and metrics.[...]
Firewalls are among the best-known security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when they are backed by effective security planning, a well-designed security policy, and when they work in concert with anti-virus[...]
A work from Cengage Learning on "Hands-On Information Security Lab Manual".
Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information securi[...]
This new edition of "Leaves of Grass" inlcudes "Live Oak, with Moss" and prose selections from "Democratic Vistas" and "Specimen Days". Throughout the text, the explanatory annotations have been revised and expanded. "Whitman on His Art" presents a collection of Whitman's statements about his role a[...]
A work from Cengage Learning on "Readings & Cases in Information Security: Law & Ethics".
A book on Roadmap to Information Security: For IT and Infosec Managers.
Fecal bacteria have classically been used for the determination of water safety, sanitary system functioning and environmental health. It is now apparent that the bacteria, both the indicator bacteria and fecal bacteria more generally, are ubiquitous and that other determinants of safety are require[...]