|
Showing 1 - 25 of
435 matches in All Departments
This book is written for the first security hire in an
organization, either an individual moving into this role from
within the organization or hired into the role. More and more,
organizations are realizing that information security requires a
dedicated team with leadership distinct from information
technology, and often the people who are placed into those
positions have no idea where to start or how to prioritize. There
are many issues competing for their attention, standards that say
do this or do that, laws, regulations, customer demands, and no
guidance on what is actually effective. This book offers guidance
on approaches that work for how you prioritize and build a
comprehensive information security program that protects your
organization. While most books targeted at information security
professionals explore specific subjects with deep expertise, this
book explores the depth and breadth of the field. Instead of
exploring a technology such as cloud security or a technique such
as risk analysis, this book places those into the larger context of
how to meet an organization's needs, how to prioritize, and what
success looks like. Guides to the maturation of practice are
offered, along with pointers for each topic on where to go for an
in-depth exploration of each topic. Unlike more typical books on
information security that advocate a single perspective, this book
explores competing perspectives with an eye to providing the pros
and cons of the different approaches and the implications of
choices on implementation and on maturity, as often a choice on an
approach needs to change as an organization grows and matures.
This book is written for the first security hire in an
organization, either an individual moving into this role from
within the organization or hired into the role. More and more,
organizations are realizing that information security requires a
dedicated team with leadership distinct from information
technology, and often the people who are placed into those
positions have no idea where to start or how to prioritize. There
are many issues competing for their attention, standards that say
do this or do that, laws, regulations, customer demands, and no
guidance on what is actually effective. This book offers guidance
on approaches that work for how you prioritize and build a
comprehensive information security program that protects your
organization. While most books targeted at information security
professionals explore specific subjects with deep expertise, this
book explores the depth and breadth of the field. Instead of
exploring a technology such as cloud security or a technique such
as risk analysis, this book places those into the larger context of
how to meet an organization's needs, how to prioritize, and what
success looks like. Guides to the maturation of practice are
offered, along with pointers for each topic on where to go for an
in-depth exploration of each topic. Unlike more typical books on
information security that advocate a single perspective, this book
explores competing perspectives with an eye to providing the pros
and cons of the different approaches and the implications of
choices on implementation and on maturity, as often a choice on an
approach needs to change as an organization grows and matures.
For centuries, Cambridge University has attracted some of the
world's greatest mathematicians. This 1889 book gives a compelling
account of how mathematics developed at Cambridge from the middle
ages to the late nineteenth century, from the viewpoint of a
leading scholar based at Trinity College who was closely involved
in teaching the subject. The achievements of notable individuals
including Newton and his school are set in the context of the
history of the university, its sometimes uneasy relationship with
the town community, the college system, and the origin and growth
of the mathematical tripos.
Although integrating security into the design of applications has
proven to deliver resilient products, there are few books available
that provide guidance on how to incorporate security into the
design of an application. Filling this need, Security for Service
Oriented Architectures examines both application and security
architectures and illustrates the relationship between the two.
Supplying authoritative guidance on how to design distributed and
resilient applications, the book provides an overview of the
various standards that service oriented and distributed
applications leverage, including SOAP, HTML 5, SAML, XML
Encryption, XML Signature, WS-Security, and WS-SecureConversation.
It examines emerging issues of privacy and discusses how to design
applications within a secure context to facilitate the
understanding of these technologies you need to make intelligent
decisions regarding their design.This complete guide to security
for web services and SOA considers the malicious user story of the
abuses and attacks against applications as examples of how design
flaws and oversights have subverted the goals of providing
resilient business functionality. It reviews recent research on
access control for simple and conversation-based web services,
advanced digital identity management techniques, and access control
for web-based workflows. Filled with illustrative examples and
analyses of critical issues, this book provides both security and
software architects with a bridge between software and
service-oriented architectures and security architectures, with the
goal of providing a means to develop software architectures that
leverage security architectures.It is also a reliable source of
reference on Web services standards. Coverage includes the four
types of architectures, implementing and securing SOA, Web 2.0,
other SOA platforms, auditing SOAs, and defending and detecting
attacks.
This is a reasoned but passionate look at how Reaganism - the
political philosophy of Ronald Reagan - has severely damaged
representative democracy as created by the nation's founders.
According to Williams, Reagan and his foremost disciple George W.
Bush have created a plutocracy where the United States is no longer
a government of the people, by the people, and for the people but
is ruled by the wealthiest individuals and corporate America.
Refreshingly unafraid to point out that Reaganism's anti-government
fundamentalism stands on feet of clay, Walter Williams asks that
Americans move from their political apathy to pay attention to the
politicians and the corporations lurking behind the power curtain
to see the dangers they represent to the true essential of the
American way of life. Williams' most important contribution is his
extended analysis of the central role the key institutions - the
presidency, Congress, the federal agencies - must play for the U.S.
government to be capable in both sustaining representative
democracy and protecting the safety and economic security of the
American people. A clear result of the weakened institutions has
been the grossly inadequate homeland security effort following
September 11, and the massive corporate fraud revealed by Enron and
other large firms that robbed the nation of hundreds of billions of
dollars in stock values and depleted the pension savings of
millions of people. The initial destructive blow that damaged the
institutions of governance can be traced to Ronald Reagan and his
simplistic antigovernment philosophy that fostered rapacious
business practices and personal greed. The book also takes the
media to task, criticizing the dismal record of failing to
investigate the political and corporate chicanery that has brought
us to this pass. Keenly argued and scrupulously documented, Walter
Williams has written a stinging wake-up call to the dangers of the
demise of representative democracy and the rise of plutocracy that
American citizens can ignore only at their peril.
Although integrating security into the design of applications has
proven to deliver resilient products, there are few books available
that provide guidance on how to incorporate security into the
design of an application. Filling this need, Security for Service
Oriented Architectures examines both application and security
architectures and illustrates the relationship between the two.
Supplying authoritative guidance on how to design distributed and
resilient applications, the book provides an overview of the
various standards that service oriented and distributed
applications leverage, including SOAP, HTML 5, SAML, XML
Encryption, XML Signature, WS-Security, and WS-SecureConversation.
It examines emerging issues of privacy and discusses how to design
applications within a secure context to facilitate the
understanding of these technologies you need to make intelligent
decisions regarding their design. This complete guide to security
for web services and SOA considers the malicious user story of the
abuses and attacks against applications as examples of how design
flaws and oversights have subverted the goals of providing
resilient business functionality. It reviews recent research on
access control for simple and conversation-based web services,
advanced digital identity management techniques, and access control
for web-based workflows. Filled with illustrative examples and
analyses of critical issues, this book provides both security and
software architects with a bridge between software and
service-oriented architectures and security architectures, with the
goal of providing a means to develop software architectures that
leverage security architectures. It is also a reliable source of
reference on Web services standards. Coverage includes the four
types of architectures, implementing and securing SOA, Web 2.0,
other SOA platforms, auditing SOAs, and defending and detecting
attacks.
In an important and provocative contribution to the debate on 'the
British disease' in the 1980s, Walter Williams draws on his
extensive American experience of central government management and
analysis to recommend critical structure changes in the
organisation of government in Britain. In this book, first
published in 1988, Williams sees such radical upheaval as the only
solution to her besetting economic and social problems, and calls
for two interlocking revolutions - one in the structure of central
government in Britain, and the other in the critical economic
institutions of the nation. The latter can only succeed if the
former has occurred, and Professor Williams focuses sharply on the
managerial and analytic changes necessary. He argues that only with
wholesale modernisation can any government, of whatever political
hue, provide the institutional capacity to cope with the problems
of a nation in deep social and economic decline. Written in a lucid
and highly accessible style, Washington, Westminster and Whitehall
is likely to provide a compelling text for anyone interested in the
nature and development of government in Britain.
In his book "The Historical Origin Of Islam" Walter Williams
explains how the religion known as Islam developed historically.
The information presented in this book differs from the traditional
Islamic theology and literature and must be read with an open mind.
Blending fast-paced military science fiction and space opera, the
first volume in a dynamic trilogy from the New York Times
bestselling author of The Praxis, set in the universe of his
popular and critically acclaimed Dread Empire's Fall series-a tale
of blood, courage, adventure and battle in which the fate of an
empire rests in the hands of a cadre of desperate exiles. It's been
seven years since the end of the Naxid War. Sidelined for their
unorthodox tactics by a rigid, tradition-bound military
establishment, Captain Gareth Martinez and Captain the Lady Sula
are stewing in exile, frustrated and impatient to exercise the
effective and lethal skills they were born to use in fighting the
enemy. Yet after the ramshackle empire left by the Shaa conquerors
is shaken by a series of hammer blows that threaten the foundations
of the commonwealth, the result is a war that no one planned, no
one expected, and no one knows how to end. Now, Martinez, Sula, and
their confederate Nikki Severin must escape the clutches of their
enemies, rally the disorganized elements of the fleet, and somehow
restore the fragile peace-or face annihilation at the hands of a
vastly superior force.
"The Historical Origin Of Christianity" by Walter Williams reveals
what happened to ancient Egyptian ancestors and how the true origin
of Christianity began.
An American president must be master of two arts: politics and
management. Without political mastery, he can't get elected, let
alone construct the power base he'll need to govern. But without
managerial expertise, his policy making will be unintelligent and
ineffective.
Managerial mastery has been missing from the administrations of
all post-World War II presidents, according to Walter Williams.
Spurred by popular anti-bureaucratic sentiment and promises to trim
the fat from the federal government, presidents from Eisenhower to
Carter have decimated the ranks of top-level bureaucrats, leaving
the Executive Office of the President alarmingly short of competent
policy advice.
Reagan took the process a step further. He was, according to
Williams, the first explicitly anti-analytic president. "Ronald
Reagan launched an eight-year war on policy information and
analysis," Williams writes. "He won. His distaste for expert policy
information, analysis, and advice led to the destruction of much of
the institutional analytic capacity built up in the Executive
Branch."
Poor policies and inept governance are the direct result of
cutbacks in expert policy information and analytic capacity,
Williams contends. He traces the decline of policy analysis since
Eisenhower, but focuses his most devastating analysis on Reagan,
who cut experts from the agencies, relied on a few hand-picked,
mainly political advisers, and held all policy analysis to an
ideological standard.
The results of the fifty-year trend, according to Williams, are
massive budget and trade deficits, public sector underinvestment in
physical and human capital that threatens America's superpower
status, and a widening gap between rich and poor that is tearing
apart the nation's social fabric. Still, the situation is not
hopeless. Williams prescribes a series of measures to correct
America's course, arguing that government is not just the problem,
it's the solution.
"This is an incisive original analysis of an important
issue."--Fred I. Greenstein, author of "Evolution of the Modern
Presidency."
"The issues examined here--the emergence of technically trained,
professional policy advisers, the proper role of such advisers, and
the consequences of presidential failure to seek and use such
advisers effectively--are of major importance to American
governance. Others have examined pieces of the puzzle, but until
now no one has explored it in this depth, using the methodology of
repeated confidential--and very candid--interviews with actual
participants in the policy process."--Harry S. Havens, author of
The "Evolution of the General Accounting Office."
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|