logo paquebote
321 libros encontrados buscando editorial: Addison Wesley

www.paquebote.com > Addison Wesley

Orden: · Ver: · Tipo:
ISBN:

0321247124

ADO.NET and System.Xml v. 2.0--The Beta Version

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 560
Precio: 41,55
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

“A highly readable and comprehensive reference to data access capabilities of the .NET Framework. Suitable for the newcomer and ‘guru’ alike.”
—Arpan Desai, program manager, System.Xml, Webdata XML Team, Microsoft Corporation
“This book goes beyond the typical API reference and goes in detail into why you would use each new feature, what scenarios they were designed for, and how things work from end to end. Great way of getting started with data access in .NET 2.0.”
—Pablo Castro, program manager, ADO.NET Team, Microsoft Corporation
“An insightful look at the XML features in version 2.0 of the .NET Framework v. 2.0 by one of the minds behind many of the innovations in the System.Xml namespace. Even though I was one of the Program Managers who worked on version 2.0 of System.Xml, Mark Fussell’s chapters still taught me a few things I didn’t know about working with XML in the .NET Framework. Truly an excellent work.”
—Dare Obasanjo, program manager, Communication Services Platform, Microsoft Corporation

ADO.NET 2.0 delivers dramatic improvements in relational data access and XML support, as well as outstanding integration with SQL Server 2005. Now’s the time to get a running start with ADO.NET and System.Xml v. 2.0—The Beta Version, the one book that delivers all the insights, best practices, and sample code you’ll need.

Two renowned .NET and XML experts, along with a lead program manager at Microsoft, reveal everything that’s new in ADO.NET and System.Xml—including major changes since 2004’s “Technology Preview.” Using realistic code examples, the authors illuminate improvements to data access and management, the DataSet class, security, schema discovery, and much more. You’ll discover how SQL Server 2005’s in-process CLR hosting will help you build faster, more robust applications—and how to make the most of advances in XML performance, schema support, usability, querying, and serialization. Topics include

  • Doing more with less code: asynchronous command execution, promotable transactions, batched update, bulk data copy, and other SqlClient class enhancements
  • Leveraging ADO.NET improvements that work with any database platform, including provider factories and the Database Schema Discovery API
  • Using the enhanced features of the DataSet class to increase flexibility, simplify coding, and improve erformance
  • Integrating with SQL Server 2005, via Multiple Active Result Sets, query notifications, and user-defined types
  • Utilizing SQL Server 2005 as an XML database: using, accessing, and updating the XML data type
  • Mastering System.Xml v. 2.0 classes for reading/writing XML, document editing, validation, transformations, security, and more
  • Discovering new techniques for customizing XML serialization and working with XML document stores
  • Maximizing application and service performance with insider tips and tricks from ADO.NET’s creators

Already assessing ADO.NET and System.Xml v. 2.0? Piloting them? Building production applications? Wherever you stand, wherever you’re headed with these technologies, this book will get you there.



ISBN:

0321349946

(SCTS) Symantec Certified Technical Specialist: Small Business Security Study Guide

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 384
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Get SCTS Certification: Your Mark of Expertise in Small Business Security!

Millions of small businesses today are vulnerable to countless security risks and threats. Symantec's Certified Technical Specialist (SCTS), Small Business Security certification allows security professionals to validate their knowledge of today's most crucial information security techniques and Symantec's market-leading security products.

Direct from Symantec, this official study guide covers the exam objective in depth: everything you need to know to pass your exam the first time. You'll gain the knowledge you need to protect small businesses from viruses, worms, Trojan horses, spam, spyware, adware, and much more. You'll learn all you need to know about the SCTS exam and certification program, as you walk through Symantec's proven eight-step preparation process.

SCTS certification represents a powerful competitive advantage for Symantec partners, security consultants, sales and system engineers, administrators, and any IT professional who works with Symantec products in a small business setting. This book will get you ready fast—and maximize your chances of success!

  • Assess your security threats and the costs and business risks associated with them

  • Understand options for dealing with junk email

  • Install, configure, and use Norton AntiSpam™ 2005 to protect organizations against spam

  • Block unwanted Web advertisements that affect security and productivity

  • Understand security risks and threats and use Symantec AntiVirus™ 10.0 to systematically protect against them

  • Plan, configure, and manage Symantec™ Client Security 3.0

  • Use Symantec Client Security's powerful firewall and intrusion detection capabilities

  • Create simple policies to customize and strengthen your protection against intruders


© Copyright Pearson Education. All rights reserved.


ISBN:

0321336437

Protect Your Windows Network: From Perimeter to Data

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 608
Precio: 51,95
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Protect Your Windows Network

"Jesper and Steve have done an outstanding job of covering the myriad of issues you must deal with to implement an effective network security policy. If you care about security this book is a must have."
—Mark Russinovich, Chief Software Architect, Winternals Software

"Johansson and Riley's new book presents complex issues in straightforward language, examining both the technical and business aspects of network security. As a result, this book is an important tutorial for those responsible for network security; and even non-technical business leaders would learn a lot about how to manage the business risk inherent in their dependence on information technology.
—Scott Charney, Vice President of Trustworthy Computing, Microsoft

"These guys have a profound understanding of what it takes to implement secure solutions in the real world! Jesper and Steve have been doing security related work (pen testing, consulting, program management, etc.) internally at Microsoft and for Microsoft's customers for many years. As a result of their real-world experience, they understand that security threats don't confine themselves to "the network" or "the operating system" and that to deliver secure solutions, these issues must be tackled at all levels after all of the threats to the environment have been identified. This book distinguishes itself from others in this field in that it does a great job of explaining the threats at many levels (network, operating system, data, and application) and how to counter these threats. A must read for security practitioners!"
—Robert Hensing, CISSP, Security Software Engineer—Security Business and Technology Unit, Microsoft Corporation, rhensing@microsoft.com

"A good book should make you think. A good computer book should make you change how you are doing things in your network. I was fortunate enough to be setting up a new server as I read the book and incorporated many of the items discussed. The lessons in these chapters have relevance to networks large and small and blow through many of the myths surrounding computer security and guide you in making smarter security decisions. Too many times people focus in on just one aspect or part of a network's security and don't look at the bigger picture. These days I'm doing my very best to keep in mind the bigger picture of the forest (active directory notwithstanding), and not just looking at those trees."
—Susan Bradley, CPA, GSEC, MCP, Small Business Server MVP, http://www.msmvps.com/Bradley, sbradcpa@pacbell.net

"Jesper Johansson and Steve Riley's Protect Your Windows Network is a must read for all organizations to gain practical insight and best practices to improve their overall security posture."
—Jon R. Wall, CISSP

"Jesper and Steve are two excellent communicators who really know their stuff! If you want to learn more about how to protect yourself and your network, read this book and learn from these two guys!"
—Richard Waymire

"In order to protect your particular Windows network you need to understand how Windows security mechanisms really work. Protect Your Windows Network gives you an in-depth understanding of Windows security so that you use the security techniques that best map to your needs."
—Chris Wysopal, Director, Development, Symantec Corporation, http://www.symantec.com

"Nowadays, a computer that is not connected to a network is fairly limited in its usefulness. At the same time, however, a networked computer is a prime target for criminals looking to take advantage of you and your systems. In this book, Jesper and Steve masterfully demonstrate the whys and hows of protecting and defending your network and its resources, providing invaluable insight and guidance that will help you to ensure your assets are more secure."
—Stephen Toub, Technical Editor, MSDN Magazine, stoub@microsoft.com

"Security is more than knobs and switches. It is a mind set. Jesper Johansson and Steve Riley clearly understand this. Protect Your Windows Network is a great book on how you can apply this mind set to people, process, and technology to build and maintain more secure networks. This book is a must read for anyone responsible for protecting their organization's network."
—Ben Smith, Senior Security Strategist, Microsoft Corporation, Author of Microsoft Windows Security Resource Kit 2 and Assessing Network Security

"Security is finally getting the mainstream exposure that it has always deserved; Johansson and Riley's book is a fine guide that can complement Microsoft's recent focus on security in the Windows-family operating systems."
—Kenneth Wehr, President, ColumbusFreenet.org

"If you have not been able to attend one of the many security conferences around the world that Jesper and Steve presented, this book is the next best thing. They are two of the most popular speakers at Microsoft on Windows security. This is an informative book on how to make your Windows network more secure. Understanding the trade-offs between high security and functionality is a key concept that all Windows users should understand. If you're responsible for network security or an application developer, this book is a must."
—Kevin McDonnell, Microsoft

In this book, two senior members of Microsoft's Security Business and Technology Unit present a complete "Defense in Depth" model for protecting any Windows network—no matter how large or complex. Drawing on their work with hundreds of enterprise customers, they systematically address all three elements of a successful security program: people, processes, and technology.

Unlike security books that focus on individual attacks and countermeasures, this book shows how to address the problem holistically and in its entirety. Through hands-on examples and practical case studies, you will learn how to integrate multiple defenses—deterring attacks, delaying them, and increasing the cost to the attacker. Coverage includes

  • Improving security from the top of the network stack to the bottom

  • Understanding what you need to do right away and what can wait

  • Avoiding "pseudo-solutions" that offer a false sense of security

  • Developing effective security policies—and educating those pesky users

  • Beefing up your first line of defense: physical and perimeter security

  • Modeling threats and identifying security dependencies

  • Preventing rogue access from inside the network

  • Systematically hardening Windows servers and clients

  • Protecting client applications, server applications, and Web services

  • Addressing the unique challenges of small business network security

Authoritative and thorough, Protect Your Windows Network will be the standard Microsoft security guide for sysadmins, netadmins, security professionals, architects, and technical decision-makers alike.
© Copyright Pearson Education. All rights reserved.


ISBN:

032133678X

Java? Puzzlers: Traps, Pitfalls, and Corner Cases

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 304
Precio: 37,39
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"Every programming language has its quirks. This lively book reveals oddities of the Java programming language through entertaining and thought-provoking programming puzzles."

--Guy Steele, Sun Fellow and coauthor of The Java™ Language Specification

"I laughed, I cried, I threw up (my hands in admiration)."

--Tim Peierls, president, Prior Artisans LLC, and member of the JSR 166 Expert Group

How well do you really know Java? Are you a code sleuth? Have you ever spent days chasing a bug caused by a trap or pitfall in Java or its libraries? Do you like brainteasers? Then this is the book for you!

In the tradition of Effective Java™, Bloch and Gafter dive deep into the subtleties of the Java programming language and its core libraries. Illustrated with visually stunning optical illusions, Java™ Puzzlers features 95 diabolical puzzles that educate and entertain. Anyone with a working knowledge of Java will understand the puzzles, but even the most seasoned veteran will find them challenging.

Most of the puzzles take the form of a short program whose behavior isn't what it seems. Can you figure out what it does? Puzzles are grouped loosely according to the features they use, and detailed solutions follow each puzzle. The solutions go well beyond a simple explanation of the program's behavior--they show you how to avoid the underlying traps and pitfalls for good. A handy catalog of traps and pitfalls at the back of the book provides a concise taxonomy for future reference.

Solve these puzzles and you'll never again fall prey to the counterintuitive or obscure behaviors that can fool even the most experienced programmers.



ISBN:

0321246748

Aspect-Oriented Analysis and Design: The Theme Approach

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 400
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"Developers who are using aspect-oriented programming will appreciate this contribution to aspect-oriented analysis and design. The authors are pioneers in this area and have elaborated on past research to produce a detailed methodology and notation for early aspects."

—Ron Bodkin, Chief Technology Officer, New Aspects of Software

"Aspect-orientation is a powerful approach for programming complex systems. There is a lot to be gained from applying this approach during modeling and designing, as well. The Theme approach in this book represents an important advancement in AOP adoption by providing practitioners means to apply aspect-orientation early on."

—Ramnivas Laddad, Author of AspectJ in Action

"Clarke & Baniassad have written an interesting book that shows how to use aspects to solve a difficult problem: composing independent program fragments with overlapping functionality. The included case studies well illustrate the principles. I recommend the book.

—Charles B. Haley, Research Fellow, The Open University

"This book presents a very useful set of techniques for helping software developers to identify the aspects. I am sure that this book will rapidly become a landmark reference for the software community!"

—João M. Fernandes, Ph.D., Universidade do Minho

Aspect-oriented software development (AOSD) is emerging as a viable approach for allowing the separate expression of multiple concerns along with "weaving" technologies for knitting together these separate expressions into coherent systems. Thanks to its great promise as an approach to simplifying the development of complex systems, many expert observers view AOSD as a worthwhile successor to the prevalent object-oriented paradigm.

In this new book, two AOSD experts apply theory to the practical realm of real-world development. They explain the different kinds of aspects, help the reader identify them, and provide guidance on successful design and implementation. The result is an applicable and easy-to-digest methodology for simplifying and optimizing the development of software systems.

Aspect-Oriented Analysis and Design: The Theme Approach will be particularly helpful for developers who are trying to answer the common questions of "What is an aspect?", "Which aspects should I be coding?", and "How do I design aspects?" Readers will come away with a starting point for thinking about aspects and accounting for them in requirements and design.

Meanwhile, seasoned AO practitioners will learn more about different models of decomposition, identifying aspect functionality in requirements documentation, designing aspects, and how to map aspect designs to code. The authors’ groundbreaking Theme approach to AOSD offers both a flexible way to identify aspect functionality and a UML-based design modeling language that can describe aspects independently of programming language.

In short, practitioners and early adopters of AO alike will appreciate this book’s practical information on how to make the significant shift to AOSD.
© Copyright Pearson Education. All rights reserved.


ISBN:

0321180860

Understanding SOA with Web Services

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 480
Precio: 39,47
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Understanding SOA with Web Services

"This book does the best job of describing not only "where we are" in the timeline of enterprise integration efforts, but also providing strategic guidance for where we need to be. The authors have worked diligently to break down the integration problem into functional areas, and send you down the path of strategic integration utilizing XML Web Services and Service-Oriented Architecture as the vehicle of choice. You will love this book!"

Daniel Edgar, Architect, Portland General Electric

"E-Government needs a comprehensive guide to SOA with Web Services standards and best practices for implementation to get from the current "as is" to the future "to be" architecture. This book meets that need superbly."

Brand Niemann, Ph.D., Co-Chair, Semantic (Web Services) Interoperability Community of Practice, U.S. Federal CIO Council.

"There are many books on SOA available today, but Understanding SOA with Web Services stands out from the pack because of its thorough, outstanding coverage of transactions, reliability, and process. Where most SOA books focus on integration and architecture basics, Lomow and Newcomer fearlessly dive into these more advanced, yet critical, topics, and provide a depth of treatment unavailable anywhere else."

Jason Bloomberg, Senior Analyst, ZapThink LLC

"This book provides a wealth of content on Web Services and SOA not found elsewhere. Although the book is technical in nature, it is surprisingly easy to read and digest. Managers who would like to keep up with the most effective technical strategies will find this book required reading."

Hari Mailvaganam, University of British Columbia, Vancouver

"I have been teaching companies and lecturing on SOA and XML Web Services for years and sort of felt at home with these technologies. I didn't think anyone else could teach me anything more significant about either of them. This book surprised me. If a person teaching SOA and Web Services can learn something from this book, you can too. This book is a must-read for all architects, senior developers, and concerned CTOs."

Sayed Y. Hashimi, SOA Consultant

"Newcomer and Lomow are no doubt the industry luminaries on the topics of Web Services, Service-Oriented Architecture, and integration. This book is sure to be a must-have for developers and architects looking to take advantage of the coming wave of standards-based, loosely coupled integration."

Ronald Schmelzer, Senior Analyst, ZapThink, LLC
Author of XML and Web Services Unleashed (Sams, 2002)

"The author makes it quite clear: SOA is an organizational principle and Web Service technology is a means to realize enterprise solutions according to this. SOA is the federative concept of nature and efficient societies. The book is an excellent starting-point to discover the new world of an IT-infrastructure adjusted to efficient business strategies and processes in a global value-add network."

Johann Wagner, Senior Architect, Siemens Business Services Author of Föderative Unternehmensprozesse

"Finally, here's a third-generation Web services book that delivers pragmatic solutions using SOAs. Newcomer and Lomow draw from their years of real-world experience ranging from developing Web services standards to hands-on applications. Listen to them."

DOUG KAYE, author of Loosely Coupled: The Missing Pieces of Web Services
Host and producer, IT Conversations (www.itconversations.com)

The definitive guide to using Service-Oriented Architecture (SOA) and Web services technologies to simplify IT infrastructure and improve business agility. Renowned experts Eric Newcomer and Greg Lomow offer practical strategies and proven best practices for every facet of SOA planning and implementation. Newcomer and Lomow pick up where Newcomer's widely read Understanding Web Services left off, showing how to fully leverage today's latest Web services standards for metadata management, security, reliable messaging, transactions, and orchestration.

Along the way, they present specific approaches and solutions for a wide range of enterprise integration and development challenges, including the largest and most complex.

Coverage includes

  • Why SOA has emerged as the dominant approach to enterprise integration

  • How and why Web services provide the ideal foundation for SOA

  • Underlying concepts shared by all SOAs: governance, service contracts, Web services platforms, service-oriented development, and more

  • Implementing service-level communications, discovery, security, data handling, transaction management, and system management

  • Using SOA to deliver application interoperability, multichannel client access, and business process management

  • Practical tutorials on WS-Security, WS-Reliable Messaging, WS-AtomicTransactions, WS-Composite Application Framework, WS-Addressing, WS-Policy, and WS-BPEL

Whether you're an architect, developer, or IT manager, Understanding SOA with Web Services will help you get SOA right—and achieve both the business and technical goals you've set for it.


© Copyright Pearson Education. All rights reserved.


ISBN:

0321334612

Eclipse Rich Client Platform: Designing, Coding, and Packaging Java? Applications

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 552
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Build Powerful, Cross-Platform Rich Client Applications

Eclipse is more than a state-of-the-art IDE: its Rich Client Platform (RCP) plug-ins form an outstanding foundation for any desktop application, from chat applications to enterprise software front-ends. In Eclipse Rich Client Platform, two leaders of the Eclipse RCP project show exactly how to leverage Eclipse for rapid, efficient, cross-platform desktop development.

In addition to explaining the power of Eclipse as a desktop application development platform, the authors walk step-by-step through developing a fully featured, branded RCP application. They introduce a wide range of techniques, including developing pluggable and dynamically extensible systems, using third-party code libraries, and packaging applications for diverse environments. You'll build, refine, and refactor a complete prototype; customize the user interface; add Help and Update features; and build, brand, and ship the finished software.

  • For every Java developer, regardless of previous Eclipse experience

  • Thoroughly covers Eclipse 3.1's new RCP features and its extensive new tools for designing, coding, and packaging RCP applications

  • Presents techniques for branding and customizing the look and feel of RCP applications

  • Shows how to overcome the challenges and "rough edges" of RCP development

  • Discusses the similarities and differences between RCP and conventional plug-in development

  • Includes an overview of OSGi, the base execution framework for Eclipse

If you want to develop and deploy world-class Java applications with rich, native GUIs, and use Eclipse RCP—get this book.

CD-ROM contains the Eclipse 3.1 SDK, Eclipse 3.1 RCP SDK, and Eclipse 3.1 RCP Delta Pack appropriate for Windows, Linux, and Mac OS X. It also contains all the code samples developed in the book.


© Copyright Pearson Education. All rights reserved.


ISBN:

0321303970

Outlook Answer Book, The: Useful Tips, Tricks, and Hacks for Microsoft Outlook® 2003

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 648
Precio: 32,19
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Discover many useful customizations you can do with Outlook to improve efficiency both at home and on the job.

Get more out of Outlook! The Outlook Answer Book brings together hundreds of bite-size tips and tricks for saving time, using Outlook more efficiently, uncovering its hidden power, and overcoming its quirks and pitfalls. With this book's fast-paced Q&A format, you can find new ideas and better solutions fast.

From Favorite Folders to the Journal, you'll learn how to take advantage of Outlook features you've never used—or even noticed! You'll master simple techniques for automating routine tasks...customizations that make Outlook far more powerful...easy backup and troubleshooting solutions...even new ways to protect your privacy and security. Bite-size, useful items include

FAQ 1.5  How Can I Get Outlook to Start Automatically?

FAQ 1.8  Can I Add Shortcuts to the Quick Launch Bar for Specific Outlook Tasks?

FAQ 4.54  How Can I Open Blocked E-mail Attachments?

FAQ 6.33  How Do I Share My Notes with Others?

FAQ 7.1  What Is the Difference Between Journaling and Other Outlook Features Such As Notes and Tasks?

FAQ 9.15  What Is the Research Service?

FAQ 10.10  How Do I Customize a Default Outlook Form?

FAQ 14.1  What Is Outlook Web Access (OWA)?

FAQ 14.39  How Can I Get a Map Showing the Location of

a Contact's Address?

FAQ 16.26  How Do I Recover Items from a Backup?
© Copyright Pearson Education. All rights reserved.


ISBN:

0321205766

Capability Cases: A Solution Envisioning Approach

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 504
Precio: 46,75
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

"In this innovative book, Irene Polikoff, Robert Coyne, and Ralph Hodgson have captured deep insights from many years of studying how to get across the 'Business-IT Gap.' Capability Cases are an invaluable tool for bridging from envisioning to design."

—Steve Cook, software architect, Microsoft Corporation

"Capability Cases offers hope that mere mortals can rise above the daunting challenge of blending technology and process. Executives hoping to adopt high-performing business models will want to learn this step-by-step approach to designing and implementing IT-enabled organizational change."

—Dr. Jeanne W. Ross, principal research scientist, MIT Center for Information

BRIDGE THE GAP BETWEEN BUSINESS VISION AND SOFTWARE SOLUTION

Both IT organizations and business leaders recognize the urgent importance of aligning technology solutions with enterprise strategy. But they've struggled to do so... until now. Capability Cases represents a breakthrough: a powerful, systematic way to translate business vision into effective plans and system designs.

The authors' Solution Envisioning methodology addresses the crucial "front end" of software development, where you decide what to build and how you're going to build it. Using realistic examples, they walk you through exploring the capabilities you need, capturing business best practices, identifying optimal solutions, and crafting software systems that deliver them.

Solution Envisioning enables you to specify better solutions in less time, build systems that more fully reflect your true needs, and dramatically reduce risk and cost throughout the entire development process. Understand Solution Envisioning—from vision to plan—in three phases:

  • Use Business Capability Exploration (BCE) to build a shared understanding of what is needed in a solution—model your business situation using business forces, desired results, metrics, and scenarios

  • Run Solution Capability Envisioning (SCE) workshops to facilitate decision-making, collaborative assessment, and consolidation of a solution concept—use Capability Case Galleries to discover alternatives, gain context, promote stakeholder interaction, and stimulate creativity

  • Move from concept to business case to a roadmap for realization with Software Capability Design (SCD)

Includes easy-to-use "best of class" templates for developing a business case, concept of operations, architectural decisions, and other key work products.

Whether you're an executive, architect, project manager, developer, change agent, or consultant, Capability Cases will help you bridge the gap between vision and solution—so you can finally get what you need from information technology.


© Copyright Pearson Education. All rights reserved.


ISBN:

0321304527

Mapping Security: The Corporate Security Sourcebook for Today's Global Economy

Editorial: Addison Wesley   Fecha de publicación:    Páginas: 432
Precio: 32,19
Añadir a la cesta
Disponible. Normalmente se envía en 4 días.

Praise for Tom Patterson's Mapping Security

"Tom Patterson captures a compelling and practical view of security in a multinational environment. Your CSO needs to read this book!"

—Dr. Vint Cerf, senior vice president of Technology Strategy at MCI and founder of Internet Protocol (IP)

"The power of the Internet is that it's a global network, seamlessly crossing borders. But it also brings security risks that can cross borders just as easily. Patterson has more than a decade of first-hand experience in defending against such risks and it shows. He uses real-world examples and stories, many from his own career, and offers clear, action-oriented descriptions of the different threats and how to deal with them. This book avoids security jargon and speaks directly to businesspeople around the globe."

—Chris Anderson, Editor in Chief, Wired Magazine

Whether consumers or global giants, we all need to be spending a greater share of our budgets on security. The threats are greater than ever and increasing daily, and yet there is a challenge as to how to justify the expenditure. Mapping Security offers business-oriented and in-depth thinking on how and why to build security into the fabric of the organization. After reading Tom Patterson's book, you will want to make changes with a sense of urgency.

—John R Patrick, president of Attitude LLC and former vice president of Internet Technology at IBM Corporation

As companies of all sizes go global in their search for profit and growth, they will need to understand how to use security as a tool for success in different markets, and Mapping Security shows them how.

—Dr. Craig Fields, former director of Advanced Research Projects Agency (ARPA) for the U.S. Government

The Definitive Guide to Effective Security in Complex Global Markets

Companies are global today and have complex security supply chains, out-sourced operations, and customer relationships that span the world. Today, more than ever, companies must protect themselves against unprecedented threats, understand and adhere to a global mosaic of regulations, and leverage security to enable today's business realities. In Mapping Security, global security expert Tom Patterson shows how to meet these challenges by presenting security best practices, rules, and customs for virtually every country where you do business.

Writing for executives, business managers, security professionals, and consultants, Patterson offers an exceptionally thorough and authoritative briefing on today's global security realities. Using real-world examples, he shows how to change your approach to security as you move more deeply into global markets: how to resolve contradictions among the complex rules and customs you'll have to follow and how to customize security solutions for every market. Along the way, he introduces the Mapping Security Index (MSI), a powerful new metric for rapidly quantifying security risk associated with 30 key markets. Coverage includes

  • How technology, mass globalization, and stricter accountability are forcing security to the core of the enterprise

  • Six proven keys to defining and implementing global security strategies that work within today's budget realities

  • Detailed country-by-country drill downs on security in Europe, the Middle East and Africa, the Americas, and the Asia-Pacific region

  • Practical advice on what to do when laws collide

  • Quantifying the security posture and associated risks of potential cross-border partners

  • On-the-ground" help: Indispensable local security resources

Visit www.MappingSecurity.com for Tom Patterson's latest updates and analysis, including the latest changes to the MSI country scores, and to participate in the Mapping Security Reader Forum.


© Copyright Pearson Education. All rights reserved.




Si no ha encontrado el libro que busca, pinche en nuestro servicio de Pedido Directo y pídanoslo.

Volver a Página Principal

Otras novedades


© Paquebote 1998-2024 Todas las secciones | Ayuda | Aviso Legal