Amazon Price: N/A (as of March 28, 2017 02:31 –
A practical guide to tapping into the abundant ideas and talent outside your organization
Successful organizations are constantly searching for new ideas. Historically, organizations have looked to their employees and select partners. They have used techniques like brainstorming to gather and evaluate ideas. However, in today’s market, talent and new ideas can be found everywhere.
Amazon Price: N/A (as of March 28, 2017 11:04 –
The Russian hackers are coming!!!!
Amazon Price: N/A (as of March 28, 2017 15:08 –
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.
Amazon Price: $24.95 $14.95 (as of March 28, 2017 12:27 –
Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay – figuratively and literally – when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level – business, technical, or personal.