You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Information <strong>Security</strong> Management Metrics: A Definitive Guide to Effective<br />
<strong>Security</strong> Monitoring and Measurement<br />
By W. Krag Brotby, CISM<br />
Auerbach Publications, ISBN: 1420052853<br />
Information <strong>Security</strong> Management Metrics offers a step-by-step approach to<br />
developing and implementing relevant security metrics. With case studies and<br />
tools for monitoring specific items, this book offers practical guidance for<br />
implementing metrics across an entire organization, thereby improving budget and<br />
resource allocation, and reducing the possibility that unanticipated events will<br />
have catastrophic impacts. The book presents metrics that complement those<br />
used by IT managers, and demonstrates how to make adjustments to metrics<br />
without interrupting business processes.<br />
Programming in Objective-C 2.0 (2nd Edition)<br />
By Stephen Kochan<br />
Addison-Wesley Professional, ISBN: 0321566157<br />
This title provides the new programmer a complete, step-by-step introduction to<br />
the Objective-C language. The book does not assume previous experience<br />
with either C or object-oriented programming languages, and it includes many<br />
detailed, practical examples of how to put Objective-C to use in your everyday<br />
programming needs. The second edition of this book has been updated and<br />
expanded to cover Objective-C 2.0. It shows how to take advantage of the<br />
Foundation framework's rich built-in library of classes and how to use the<br />
iPhone SDK to develop programs.<br />
Cisco Routers for the Desperate, 2nd Edition<br />
By Michael Lucas<br />
No Starch Press, ISBN: 1593270496<br />
Just like the original, this second edition of the highly acclaimed Cisco Routers<br />
for the Desperate is written for the administrator in crisis mode. Updated to<br />
cover switches and the latest Cisco terminology, with a tighter focus on the<br />
needs of the small network administrator, this second edition covers installation,<br />
troubleshooting routers and switches, security concerns, and how to implement<br />
basic network redundancy to reduce the risk of network downtime. Cisco<br />
Routers for the Desperate, 2nd Edition is designed to be read once and left<br />
alone until something breaks. When it does, you'll have everything you need to<br />
know in one easy-to-follow guidebook.<br />
Googling <strong>Security</strong>: How Much Does Google Know About You?<br />
By Greg Conti<br />
Addison-Wesley Professional, ISBN: 0321518667<br />
Googling <strong>Security</strong> is the first book to reveal how Google's vast information<br />
stockpiles could be used against you or your business, and what you can do to<br />
protect yourself. Unlike other books on Google hacking, this book covers<br />
information you disclose when using all of Google's top applications: Gmail,<br />
Google Maps, Google Talk, Google Groups, Google Alerts, Google's new<br />
mobile applications, and more. He shows how Google's databases can be used<br />
by others with bad intent, even if Google succeeds in its pledge of "don't be<br />
evil."<br />
www.insecuremag.com 31