12.11.2012 Views

Download - Help Net Security

Download - Help Net Security

Download - Help Net Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Information <strong>Security</strong> Management Metrics: A Definitive Guide to Effective<br />

<strong>Security</strong> Monitoring and Measurement<br />

By W. Krag Brotby, CISM<br />

Auerbach Publications, ISBN: 1420052853<br />

Information <strong>Security</strong> Management Metrics offers a step-by-step approach to<br />

developing and implementing relevant security metrics. With case studies and<br />

tools for monitoring specific items, this book offers practical guidance for<br />

implementing metrics across an entire organization, thereby improving budget and<br />

resource allocation, and reducing the possibility that unanticipated events will<br />

have catastrophic impacts. The book presents metrics that complement those<br />

used by IT managers, and demonstrates how to make adjustments to metrics<br />

without interrupting business processes.<br />

Programming in Objective-C 2.0 (2nd Edition)<br />

By Stephen Kochan<br />

Addison-Wesley Professional, ISBN: 0321566157<br />

This title provides the new programmer a complete, step-by-step introduction to<br />

the Objective-C language. The book does not assume previous experience<br />

with either C or object-oriented programming languages, and it includes many<br />

detailed, practical examples of how to put Objective-C to use in your everyday<br />

programming needs. The second edition of this book has been updated and<br />

expanded to cover Objective-C 2.0. It shows how to take advantage of the<br />

Foundation framework's rich built-in library of classes and how to use the<br />

iPhone SDK to develop programs.<br />

Cisco Routers for the Desperate, 2nd Edition<br />

By Michael Lucas<br />

No Starch Press, ISBN: 1593270496<br />

Just like the original, this second edition of the highly acclaimed Cisco Routers<br />

for the Desperate is written for the administrator in crisis mode. Updated to<br />

cover switches and the latest Cisco terminology, with a tighter focus on the<br />

needs of the small network administrator, this second edition covers installation,<br />

troubleshooting routers and switches, security concerns, and how to implement<br />

basic network redundancy to reduce the risk of network downtime. Cisco<br />

Routers for the Desperate, 2nd Edition is designed to be read once and left<br />

alone until something breaks. When it does, you'll have everything you need to<br />

know in one easy-to-follow guidebook.<br />

Googling <strong>Security</strong>: How Much Does Google Know About You?<br />

By Greg Conti<br />

Addison-Wesley Professional, ISBN: 0321518667<br />

Googling <strong>Security</strong> is the first book to reveal how Google's vast information<br />

stockpiles could be used against you or your business, and what you can do to<br />

protect yourself. Unlike other books on Google hacking, this book covers<br />

information you disclose when using all of Google's top applications: Gmail,<br />

Google Maps, Google Talk, Google Groups, Google Alerts, Google's new<br />

mobile applications, and more. He shows how Google's databases can be used<br />

by others with bad intent, even if Google succeeds in its pledge of "don't be<br />

evil."<br />

www.insecuremag.com 31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!