09/12/2007 - Why is “No comment” the wrong response to any media question? According to the authors, those words precipitate questions such as, “What are you trying to hide?” and “What’s really going on here?” They offer tips on what needs to be said and how to say it.
09/12/2007 - The book covers these 19 programming flaws, which include the most devastating types of coding and architectural errors, such as buffer overflows, format string problems, cross-site scripting, and insufficient encryption.
09/11/2007 - Jemaah Islamiyah, Aum Shinrikyo, Hizballah, the Provisional Irish Republican Army, and the radical environmentalist movement are singled out for case studies in volume two of this RAND examination of how terrorists learn.
09/11/2007 - Organizations do not function in a vacuum. They must balance and navigate business processes and interdependencies, the Internet, distributed systems, and legislation and regulation, just to name a few factors that influence their environment and posture.
08/24/2007 - The period from the late 1990s into the early years of the 21st century is likely the best-documented era of corporate scandal in history. In Corporate Crooks, Greg Farrell, an investigative reporter for USA Today, offers a simple primer on the subject.
08/24/2007 - With the technological advances and world events of the past 25 years, security management has evolved greatly and become both a vital business function and an academic discipline. Recognizing this, Robert D. McCrie has wisely chosen to update this classic reference source for students, practitioners, and business managers alike.