![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 414 matches in All Departments
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role. More and more, organizations are realizing that information security requires a dedicated team with leadership distinct from information technology, and often the people who are placed into those positions have no idea where to start or how to prioritize. There are many issues competing for their attention, standards that say do this or do that, laws, regulations, customer demands, and no guidance on what is actually effective. This book offers guidance on approaches that work for how you prioritize and build a comprehensive information security program that protects your organization. While most books targeted at information security professionals explore specific subjects with deep expertise, this book explores the depth and breadth of the field. Instead of exploring a technology such as cloud security or a technique such as risk analysis, this book places those into the larger context of how to meet an organization's needs, how to prioritize, and what success looks like. Guides to the maturation of practice are offered, along with pointers for each topic on where to go for an in-depth exploration of each topic. Unlike more typical books on information security that advocate a single perspective, this book explores competing perspectives with an eye to providing the pros and cons of the different approaches and the implications of choices on implementation and on maturity, as often a choice on an approach needs to change as an organization grows and matures.
Unlike some other reproductions of classic texts (1) We have not used OCR(Optical Character Recognition), as this leads to bad quality books with introduced typos. (2) In books where there are images such as portraits, maps, sketches etc We have endeavoured to keep the quality of these images, so they represent accurately the original artefact. Although occasionally there may be certain imperfections with these old texts, we feel they deserve to be made available for future generations to enjoy.
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design.This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures.It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
In "Honest Numbers and Democracy," Walter Williams offers a revealing history of policy analysis in the federal government and a scorching critique of what's wrong with social policy analysis today. Williams, a policy insider who witnessed the birth of domestic policy analysis during the Johnson administration, contends that the increasingly partisan U.S. political environment is vitiating both "honest numbers" -- the data used to direct public policy -- and, more importantly, honest analysts, particularly in the White House. Drawing heavily on candid off-the-record interviews with political executives, career civil servants, elected officials and Washington-based journalists, Williams documents the steady deformation of social policy analysis under the pressure of ideological politics waged by both the executive and legislative branches. Beginning with the Reagan era and continuing into Clinton's tenure, Williams focuses on the presidents' growing penchant to misuse and hide numbers provided by their own analysts to assist in major policy decisions. "Honest Numbers and Democracy" is the first book to examine in-depth the impact of the electronic revolution, its information overload, and rampant public distrust of the federal government's data on the practice of policy analysis. A hard-hitting account of the factors threatening the credibility of the policymaking process, this book will be required reading for policy professionals, presidential watchers, and anyone interested in the future of U.S. democracy.
This is a reasoned but passionate look at how Reaganism - the political philosophy of Ronald Reagan - has severely damaged representative democracy as created by the nation's founders. According to Williams, Reagan and his foremost disciple George W. Bush have created a plutocracy where the United States is no longer a government of the people, by the people, and for the people but is ruled by the wealthiest individuals and corporate America. Refreshingly unafraid to point out that Reaganism's anti-government fundamentalism stands on feet of clay, Walter Williams asks that Americans move from their political apathy to pay attention to the politicians and the corporations lurking behind the power curtain to see the dangers they represent to the true essential of the American way of life. Williams' most important contribution is his extended analysis of the central role the key institutions - the presidency, Congress, the federal agencies - must play for the U.S. government to be capable in both sustaining representative democracy and protecting the safety and economic security of the American people. A clear result of the weakened institutions has been the grossly inadequate homeland security effort following September 11, and the massive corporate fraud revealed by Enron and other large firms that robbed the nation of hundreds of billions of dollars in stock values and depleted the pension savings of millions of people. The initial destructive blow that damaged the institutions of governance can be traced to Ronald Reagan and his simplistic antigovernment philosophy that fostered rapacious business practices and personal greed. The book also takes the media to task, criticizing the dismal record of failing to investigate the political and corporate chicanery that has brought us to this pass. Keenly argued and scrupulously documented, Walter Williams has written a stinging wake-up call to the dangers of the demise of representative democracy and the rise of plutocracy that American citizens can ignore only at their peril.
Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, including SOAP, HTML 5, SAML, XML Encryption, XML Signature, WS-Security, and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues, this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures, with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures, implementing and securing SOA, Web 2.0, other SOA platforms, auditing SOAs, and defending and detecting attacks.
Blending fast-paced military science fiction and space opera, the first volume in a dynamic trilogy from the New York Times bestselling author of The Praxis, set in the universe of his popular and critically acclaimed Dread Empire's Fall series-a tale of blood, courage, adventure and battle in which the fate of an empire rests in the hands of a cadre of desperate exiles. It's been seven years since the end of the Naxid War. Sidelined for their unorthodox tactics by a rigid, tradition-bound military establishment, Captain Gareth Martinez and Captain the Lady Sula are stewing in exile, frustrated and impatient to exercise the effective and lethal skills they were born to use in fighting the enemy. Yet after the ramshackle empire left by the Shaa conquerors is shaken by a series of hammer blows that threaten the foundations of the commonwealth, the result is a war that no one planned, no one expected, and no one knows how to end. Now, Martinez, Sula, and their confederate Nikki Severin must escape the clutches of their enemies, rally the disorganized elements of the fleet, and somehow restore the fragile peace-or face annihilation at the hands of a vastly superior force.
"The Historical Origin Of Christianity" by Walter Williams reveals what happened to ancient Egyptian ancestors and how the true origin of Christianity began.
In his book "The Historical Origin Of Islam" Walter Williams explains how the religion known as Islam developed historically. The information presented in this book differs from the traditional Islamic theology and literature and must be read with an open mind.
This scarce antiquarian book is a selection from Kessinger Publishing's Legacy Reprint Series. Due to its age, it may contain imperfections such as marks, notations, marginalia and flawed pages. Because we believe this work is culturally important, we have made it available as part of our commitment to protecting, preserving, and promoting the world's literature. Kessinger Publishing is the place to find hundreds of thousands of rare and hard-to-find books with something of interest for everyone! |
![]() ![]() You may like...
Thinking about Stories - An Introduction…
Samuel Lebens, Tatjana von Solodkoff
Paperback
R1,148
Discovery Miles 11 480
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
|