Title: Enterprise iPhone and iPad Administrator's Guide, Author: Charles Edge
Title: Nmap in the Enterprise: Your Guide to Network Scanning, Author: Angela Orebaugh
Title: PeopleSoft HRMS Reporting, Author: Adam Bromwich
Explore Series
Title: Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization, Author: Aaron Tiensivu
Title: Service-Oriented Architecture Governance for the Services Driven Enterprise, Author: Eric A. Marks
Title: Information Security: Design, Implementation, Measurement, and Compliance, Author: Timothy P. Layton
Title: Far from the Factory: Lean for the Information Age, Author: George Gonzalez-Rivas
Title: Managing IT Performance to Create Business Value, Author: Jessica Keyes
Title: New Directions in Internet Management, Author: Sanjiv Purba
Title: A Practical Approach to WBEM/CIM Management, Author: Chris Hobbs
Title: Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals, Author: Constantine Photopoulos
Title: The SIM Guide to Enterprise Architecture, Author: Leon Kappelman
Title: Security Metrics, Author: Andrew Jaquith
Title: Internet Security: A Jumpstart for Systems Administrators and IT Managers, Author: Tim Speed
Title: PeopleSoft Developer's Guide for PeopleTools & PeopleCode, Author: Judi Doolittle
Title: Information Technology Risk Management in Enterprise Environments: A Review of Industry Practices and a Practical Guide to Risk Management Teams, Author: Jake Kouns
Title: Global Networks, Linked Cities, Author: Saskia Sassen
Title: The Ethical Hack: A Framework for Business Value Penetration Testing, Author: James S. Tiller
Title: Digital Identity Management: Technological, Business and Social Implications, Author: David Birch
Title: Thor's Microsoft Security Bible: A Collection of Practical Security Techniques, Author: Timothy

Pagination Links