Prev 10 articles | Next 10 articles
Not just for corporate dynamos anymore, the versatile and flexible BlackBerry handheld computing device allows anyone, anywhere to stay in touch and manage life with ease.
Read More
Conventional wisdom dictates that there must be a tradeoff between security and usability. To illustrate the point, Lorrie Faith Cranor, DSc, and Simson Garfinkel, Ph.D., contrast a computer with no passwords with one "that makes you authenticate every five minutes with your password and a fresh drop of blood." The former is usable, but not secure, while the latter is secure but holds little appeal to most users. In their new book, "Security and Usability" published by O'Reilly, Cranor and Garfinkel contend that security and usability are not inherently at odds in fact, tomorrow's computers won't be secure unless researchers, designers, and programmers can invent new ways to make security systems easier to use.
Read More
In this book Kevin Kenan, a crypto expert at Symantec, demonstrates how to use encryption to protect enterprise databases and applications.
Read More
This standard essentially defines an Information Security Management System (known as an ISMS), and compliments the ISO 17799 'code of practice' standard, which was re-published earlier in the year. It specifies the framework for the design, management and maintenance of information security processes within an organization.
Read More
Security architecture theory and practice are brought together in a new book for IT business managers. Enterprise Security Architecture: A Business Driven Approach by top independent information security experts John Sherwood, Andy Clark and David Lynas, provides a much-needed generic framework to develop solutions that can be unique for individual enterprises.
Read More
O'Reilly has Released "Switching to the Mac: The Missing Manual, Tiger Edition"
Read More
Planning and Creating an Identity Management Architecture - O'Reilly Releases "Digital Identity"
Read More
Agile Web Development with Rails: A Pragmatic Guide by Dave Thomas and David Heinemeier Hansson Published
Read More
Prentice Hall Publishes "Data Protection and Information Lifecycle Management" by Tom Petrocelli
Read More
O'Reilly Releases "Nokia Smartphone Hacks"
Read More
Prev 10 articles | Next 10 articles