Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content

Prev 10 articles Prev 10 articles | Next 10 articles Next 10 articles

New Book: Preventing Web Attacks With Apache
27 Jan 12:12
An end-to-end guide to securing Apache Web servers and Web applications

Read More Read More

Report: RFID Forecasts 2006 to 2016
26 Jan 03:57
IDTechEx has researched the RFID industry to bring new forecasts for the years ahead. Cumulative sales of RFID tags for sixty years until the beginning of 2006 totalled 2.4 billion, with 600 million tags being sold in 2005 alone. In 2006, IDTechEx expect 1.3 billion tags to be sold. Of that about 500 million RFID smart labels will be used for pallet and case level tagging but the majority will be used for a range of diverse markets from baggage and passports to contactless payment cards and drugs.

Read More Read More

New Book: The Risk Management Universe. A Guided Tour
26 Jan 03:19
With a constantly changing business environment, converting risks into positive organizational advantages make risk a strategic issue that requires a process of careful planning, implementation and management from all levels called risk management. Relevant to all organizations whether they are in the public or private sector, risk management helps the organization confirm its compliance with corporate governance requirements.

Read More Read More

New Book: Software Project Management
25 Jan 01:08
O'Reilly publishes Applied Software Project Management.

Read More Read More

New Guide to Building Secure Web Applications
19 Jan 12:32
O'Reilly Releases "Essential PHP Security"

Read More Read More

New Book: The Most Comprehensive Tiger Reference on the Market
19 Jan 12:13
O'Reilly Releases "Mac OS X Tiger in a Nutshell"

Read More Read More

New Book: The Heart of Linux 2.6 - From I/O Ports to Process Management
19 Jan 11:47
O'Reilly has released "Understanding the Linux Kernel, Third Edition".

Read More Read More

Book: Event-Driven Network Programming with Python
16 Jan 11:19
There are a lot of network tasks that developers may have on their wish lists for projects, but never seriously consider because of the amount of work involved to pull them off - tasks such as giving an application an embedded SSH server for administration, or writing a custom IMAP server. New O'Reilly book comes to the assistance.

Read More Read More

New Book: Source is Everything - The Continuing Evolution
10 Jan 11:56
When the original "Open Sources: Voices from the Revolution" was published in 1999, Eric. S. Raymond noted that the Internet "has even brought hacker culture to the beginnings of mainstream respectability and clout." A half-decade later, open source has grown far beyond the mainstream, observes Kim Polese, CEO of SpikeSource, in her foreword to "Open Sources 2.0". "It has become the bedrock over which the mainstream flows. Today it is hard to find a Fortune 500 company with an IT infrastructure that does not depend, in some fundamental way, on open source software."

Read More Read More

Book: How to Follow the Clues at an Internet Crime Scene
19 Dec 05:30
It's a hotbed of fraud, spammers, and identity theft, but, undaunted, we spend more and more of our time (and money) on the Internet. Few of us consider the "threats" it proffers to be more than a nuisance, forgetting that there's real criminal intent behind them targeting some of the most vulnerable members of our society. We overlook the content in spam messages because we already know them to be scams. But, while we would never click on a link in an email to update our password and social security number for a bank account, many people do.

Read More Read More

Prev 10 articles Prev 10 articles | Next 10 articles Next 10 articles