Seems you have not registered as a member of brazil123.net!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Official (ISC)2 Guide to the CISSP CBK, Second Edition
  • Language: en
  • Pages: 968

Official (ISC)2 Guide to the CISSP CBK, Second Edition

  • Type: Book
  • -
  • Published: 2009-12-22
  • -
  • Publisher: CRC Press

With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s privacy, compromising intellectual property, and in some cases endangering personal safety. This is why it is essential for information security professionals to stay up to date with the latest advances in technology and the new security threats they create. Recognized as one of the best tools available for the information security professional and especially for candidates studying for the (ISC)2 CISSP examination, the Official (ISC)2® Guide to the CISSP® CBK®, Second Edition has been updated and revised to refl...

The ABCs of IP Addressing
  • Language: en
  • Pages: 216

The ABCs of IP Addressing

  • Type: Book
  • -
  • Published: 2001-11-28
  • -
  • Publisher: CRC Press

Our world is rapidly becoming an Internet-based world, with tens of millions of homes, millions of businesses, and within a short period of time, possibly hundreds of millions of mobile professionals accessing the literal mother of all networks. One of the key problems affecting many Internet users, ranging from individual professionals to networking managers and administrators, is a lack of knowledge concerning Internet Protocol (IP) addressing. A detailed reference guide, The ABCs of IP Addressing provides you with the detailed information about the key challenges of IP addressing and designing networks that work efficiently. It takes you from the basics of the binary numbering system to a...

MPLS for Metropolitan Area Networks
  • Language: en
  • Pages: 448

MPLS for Metropolitan Area Networks

  • Type: Book
  • -
  • Published: 2004-11-15
  • -
  • Publisher: CRC Press

Metro Service Providers are increasingly turning to Multi-Protocol Label Switching (MPLS) to converge disparate networks and services into a unified core, maintain quality, and deliver additional value-added capabilities. MPLS for Metropolitan Area Networks addresses service providers' challenges by demonstrating solutions provided by MPLS features such as traffic engineering (TE), fast reroute, VPNs, virtual private LAN services (VPLS), and QoS. The text opens with an overview of metro networks and MPLS, describing business opportunities and challenges and how mission-critical applications can be deployed within Metropolitan Area Networks (MANs). It then examines traffic engineering issues,...

Making Supply Chain Management Work
  • Language: en
  • Pages: 752

Making Supply Chain Management Work

  • Type: Book
  • -
  • Published: 2001-12-13
  • -
  • Publisher: CRC Press

Any supply chain improvement project, even if well conceived, has a good chance of failing, unless the accompanying information technology enables the design. Being prepared, understanding the risks and how to reduce them, will give you the edge you need. Combining a technology focus with practical advice, Making Supply Chain Management Work: Design, Implementation, Partnerships, Technology, and Profits gives you the tools to not only design new supply chains, but to design them effectively. The book begins with an introduction to SCM. It identifies and describes the five management tasks that are changing as organizations increasingly compete as parts of supply chains rather than standalone...

Potential for Data Loss from Security Protected Smartphones
  • Language: en
  • Pages: 60

Potential for Data Loss from Security Protected Smartphones

Smartphones have been widely accepted by mass market users and enterprise users. However, the threats related to Smartphones have emerged. Smartphones carry substantial amounts of sensitive data. There have been successful attacks in the wild on jail broken phones. Therefore, smartphones need to be treated like a computer and have to be secured from all types of attacks. There is proof of concept attacks on Apple iOS and Google Android. This project aims to analyze some of the attacks on Smartphones and find possible solutions in order to defend the attacks. Thereby, this project is based on a proof of concept malware for testing antivirus software.

Contracting for Services in State and Local Government Agencies
  • Language: en
  • Pages: 480

Contracting for Services in State and Local Government Agencies

  • Type: Book
  • -
  • Published: 2008-11-05
  • -
  • Publisher: CRC Press

The First Complete Contracting Reference/ Textbook for State and Local Agencies Federal contracting officials have a comprehensive resource in the Federal Acquisition Regulations (FAR) to guide them through the arduous contracting process; however, until now there has been no such counterpart for state and local government agencies. Contracting for Services in State and Local Government Agencies is the first reference book of its kind specifically designed to provide state and local administrators with a concise authoritative resource on contracting for services. Draws from the best features of existing RFPs and contracts nationwide In preparation for writing this book, author William Sims C...

Knowledge Management in Practice
  • Language: en

Knowledge Management in Practice

  • Type: Book
  • -
  • Published: 2016
  • -
  • Publisher: Unknown

None

WiMAX Network Planning and Optimization
  • Language: en
  • Pages: 451

WiMAX Network Planning and Optimization

  • Type: Book
  • -
  • Published: 2009-04-23
  • -
  • Publisher: CRC Press

This book offers a comprehensive explanation on how to dimension, plan, and optimize WiMAX networks. The first part of the text introduces WiMAX networks architecture, physical layer, standard, protocols, security mechanisms, and highly related radio access technologies. It covers system framework, topology, capacity, mobility management, handoff management, congestion control, medium access control (MAC), scheduling, Quality of Service (QoS), and WiMAX mesh networks and security. Enabling easy understanding of key concepts and technologies, the second part presents practical examples and illustrative figures to explain planning techniques and optimization algorithms. The author provides both theoretical and practical information to ensure in-depth, realistic results.

Six Sigma Software Development, Second Edition
  • Language: en
  • Pages: 488

Six Sigma Software Development, Second Edition

  • Type: Book
  • -
  • Published: 2007-03-27
  • -
  • Publisher: CRC Press

Even though Six Sigma programs have successfully been implemented in practice, many IT departments remain skeptical of the process or are unaware of how the tools can be used to improve system development. Removing the mystique surrounding this technique, Six Sigma Software Development, Second Edition demonstrates how Six Sigma tools and concepts can be used to enhance the system development process. Revised and updated, this second edition clearly explains Six Sigma concepts and their application, maps Six Sigma concepts and tools to all aspects of system development, and proposes the use of Six Sigma tools to evaluate and improve the overall performance of the IT department. In addition to classic Six Sigma, the book introduces Design for Six Sigma (DFSS) and illustrates when and how its tools and techniques can be used to increase the robustness and reliability of a new system. It also shows how the judicious application of lean tools can reduce the complexity of IT processes, thus shortening the time needed to translate customer requirements into completed systems and increasing customer satisfaction.

ZigBee® Network Protocols and Applications
  • Language: en
  • Pages: 378

ZigBee® Network Protocols and Applications

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Compared with other wireless communication technologies, such as Bluetooth, WiFi, and UWB, ZigBee® is a far more reliable, affordable, and energy-efficient option. It is also the only global wireless communication standard for easily deployed, low-power consumption products. ZigBee® Network Protocols and Applications provides detailed descriptions of ZigBee network protocols and explains how to set up and develop your own ZigBee-based customized applications with step-by-step instructions. Starting with a brief introduction to near-field communications, low-power communications, and related protocols, it discusses ZigBee architectures, standards, and protocols. It also addresses potential ...