Search Results: 'Logical Access Control'

Search

×
×
×
×
6 results for "Logical Access Control"
Telerik Rad Grid Control for ASP.NET AJAX by Full Example (4th edition) By Stephen Thomas
eBook (ePub): $14.99
Download immediately.
This is the 4th edition of the book and added is the following: add filters to your RadGrid, using case sensitivity, adjusting filter text box width, hiding filters. The 3rd edition of this book adds... More > many more advanced features including JavaScript, Rad callbacks, popup confirmation windows, popup notification windows, AJAX Progress Indicator with fade in and fade out animation, Rad Window Manager, Rad Ajax Loading Panel, Rad Notification, Rad Ajax Panel, Rad Script Block, on item command, a new business layer project with data access logic, Item commands, and viewstate variables. The delete command has now been moved to the business layer in order to use popup confirmation windows to allow the user to cancel the delete operation if it was click in error. Also notification popup windows are add to notify the user that the operation was either successful or cancelled. This will create a more improved user experience for your RadGrid application.< Less
Ensuring Information Assets Protection By Robert E. Davis,
eBook (PDF): $36.24
Download immediately.
Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be... More > utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization. “Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.< Less
Ensuring Information Assets Protection By Robert E. Davis,
Hardcover: $46.24
Ships in 6-8 business days.
Information technology (IT) assets must be protected from external and internal activities detrimental to effective and efficient functionality. For this purpose, mechanisms exist that can be... More > utilized to ensure hardware, software, and other resources are operated on by only those tasks that have gained proper authorization. “Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics. Through this publication, security professionals will acquire an appreciation for the complexities associated with ensuring an adequate information security program.< Less
IT Auditing: Assuring Information Assets Protection By Robert E. Davis, MBA, CISA, CICA
Hardcover: $95.00
Ships in 6-8 business days.
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this... More > publication converts selected audit standards and guidelines into practical applications using detailed examples and conceptual graphics. This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases. Through this publication, auditors and security professionals will acquire an appreciation for the complexities associated with assuring information security programs.< Less
IT Auditing: Assuring Information Assets Protection By Robert E. Davis, MBA, CISA, CICA
eBook (PDF): $59.95
Download immediately.
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques. In terms of content, this... More > publication converts selected audit standards and guidelines into practical applications using detailed examples and conceptual graphics. This publication also allows auditors and security professionals to understand various steps and processes required to adequately initiate, document, and compile information assets protection audit or review phases. Through this publication, auditors and security professionals will acquire an appreciation for the complexities associated with assuring information security programs.< Less
Aerodynamics for Engineering Students By Square Ragnarok
eBook (PDF): $903.94
Download immediately.
Already established as the leading course text on aerodynamics, Aerodynamics for Engineering Students has been revised to include the latest developments in flow control and boundary layers, and... More > their influence on modern wing design, as well as introducing recent advances in the understanding of fundamental fluid dynamics. Computational methods have been expanded and updated to reflect the modern approaches to aerodynamic design and research in the aeronautical industry and elsewhere, and the structure of the text has been developed to reflect current course requirements. The book is designed to be accessible and practical. Theory is developed logically within each chapter with notation, symbols and units well defined throughout, and the text is fully illustrated with worked examples and exercises. The classic text, expanded and updated. Includes latest developments in flow control, boundary layers and fluid dynamics. Fully illustrated throughout with illustrations, worked examples and exercises.< Less