By Joel Scambray
Published: December 4, 2007
The latest Windows security attack and defense strategies
"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell
By Brian Berenbach and Daniel Paulish and Juergen Kazmeier and Arnold Rudorfer
Published: March 26, 2009
Proven Software & Systems Requirements Engineering Techniques
"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large...
By Regis Bud J. Bates and Donald Gregory
Published: December 13, 2006
The Definitive Telecommunications Reference--Fully Updated
Understand cutting-edge telecommunication and networking technologies using this straightforward, real-world implementation guide. Fully revised to cover all...