Portal Home |  IS News Menu |  Portal Menu |  ISB Menu |  Main Content

Prev 10 articles Prev 10 articles | Next 10 articles Next 10 articles

New Book: Maximize the Untapped Power of a BlackBerry
19 Dec 04:20
Not just for corporate dynamos anymore, the versatile and flexible BlackBerry handheld computing device allows anyone, anywhere to stay in touch and manage life with ease.

Read More Read More

Designing Secure Systems that People Can Use
07 Dec 11:49
Conventional wisdom dictates that there must be a tradeoff between security and usability. To illustrate the point, Lorrie Faith Cranor, DSc, and Simson Garfinkel, Ph.D., contrast a computer with no passwords with one "that makes you authenticate every five minutes with your password and a fresh drop of blood." The former is usable, but not secure, while the latter is secure but holds little appeal to most users. In their new book, "Security and Usability" published by O'Reilly, Cranor and Garfinkel contend that security and usability are not inherently at odds in fact, tomorrow's computers won't be secure unless researchers, designers, and programmers can invent new ways to make security systems easier to use.

Read More Read More

New Book: Cryptography in the Database
07 Dec 04:46
In this book Kevin Kenan, a crypto expert at Symantec, demonstrates how to use encryption to protect enterprise databases and applications.

Read More Read More

ISO 27001 Security Standard Published - New Books Out
22 Nov 05:52
This standard essentially defines an Information Security Management System (known as an ISMS), and compliments the ISO 17799 'code of practice' standard, which was re-published earlier in the year. It specifies the framework for the design, management and maintenance of information security processes within an organization.

Read More Read More

Enterprise Security Architecture: A Business-Driven Approach
11 Nov 01:20
Security architecture theory and practice are brought together in a new book for IT business managers. Enterprise Security Architecture: A Business Driven Approach by top independent information security experts John Sherwood, Andy Clark and David Lynas, provides a much-needed generic framework to develop solutions that can be unique for individual enterprises.

Read More Read More

Switch to the Mac With Ease
25 Oct 07:10
O'Reilly has Released "Switching to the Mac: The Missing Manual, Tiger Edition"

Read More Read More

Digital Identity
10 Oct 08:57
Planning and Creating an Identity Management Architecture - O'Reilly Releases "Digital Identity"

Read More Read More

Web Development with Rails
03 Oct 01:22
Agile Web Development with Rails: A Pragmatic Guide by Dave Thomas and David Heinemeier Hansson Published

Read More Read More

Guide to Protecting Enterprise Data
29 Sep 01:25
Prentice Hall Publishes "Data Protection and Information Lifecycle Management" by Tom Petrocelli

Read More Read More

Mini but Mighty SmartPhone Powers Mobile Computing
24 Sep 01:16
O'Reilly Releases "Nokia Smartphone Hacks"

Read More Read More

Prev 10 articles Prev 10 articles | Next 10 articles Next 10 articles