Related Articles

26 products

Advertisement

User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection
This book provides a methodology and philosophy that organizations can easily adopt without the pitfalls of traditional architectural styles. This systematic approach uses the right balance of tools and techniques to help
Written by leading industry experts, the Data Management Handbook is a comprehensive, single-volume guide to the most innovative ideas on how to plan, develop, and run a powerful data management function -
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.