Monday, December 29, 2008

Redeveloping Communication for Social Change or Information Security Management Handbook Fourth Edition Volume 2

Redeveloping Communication for Social Change: Theory, Practice, and Power

Author: Karin G Wilkins

To reshape the field of development communication, "Redeveloping Communication for Social Change" proposes situating theory and practice within contexts of power, recognizing both the ability of dominant groups to control and the potential for marginal communities to resist. Contributors from communication and anthropology explore the global and institutional structures within which agencies construct social problems and interventions, the discourse guiding the normative climate for conceiving and implementing projects, and the practice of strategic interventions for social change. Examining early and emerging models of development, power dynamics, ethnographic approaches, gender issues, and information technologies, they speculate how a framework accounting for power might contribute toward new directions and applications in the field. Instead of mourning the demise of development communication, this volume should provoke critical debate that will help us change our approaches to meet new challenges.

Author Biography: Karin Gwinn Wilkins is assistant professor in the Department of Radio-Television-Film at the University of Texas at Austin, with joint appointments in the Center for Asian Studies, the Center for Middle Eastern Studies, and the Population Research Center.



Interesting textbook: Student Study Guide to Accompany Contemporary Management or Transnational Management

Information Security Management Handbook, Fourth Edition, Volume 2

Author: Harold F Tipton

The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network protocols make the tightness of an organization's security system an issue of prime importance. And information systems technology is advancing at a frenetic pace. Against this background, the challenges facing information security professionals are increasing rapidly.Information Security Management Handbook, Fourth Edition, Volume 2 is an essential reference for anyone involved in the security of information systems.

Booknews

In response to new developments in information technologies, this second volume supplements the fourth edition with new information, covering access control issues; authentication services; network security<-->which includes ATM, frame relay, remote access, network monitoring, and TCP/IP; intrusion detection; penetration testing; secure voice communications; cryptography; security architecture and models; operations security; business continuity planning; and law and ethics. The format continues to follow the standard for Certified Information Systems Security (CISSP) professional certification examination. Contributors are all specialists in computer security systems for various corporations, and/or are associated with CISSP. Annotation c. Book News, Inc., Portland, OR (booknews.com)



Table of Contents:
Access Control Systems and Methodology

Access Control Issues

Access Control Administration

Telecommunications and Network Security

Network Security

Internet, Intranet, and Extranet Security

Voice Communications

Security Management Practices

Security Awareness

Policies, Standards, Procedures, and Guidelines

Risk Management

Applications and Systems Development Security

Application Security

System Security

Cryptography

Crypto Technology and Implementations

Security Architecture and Models

Microcomputer and LAN Security

Systems Architecture and Design

Operations Security

Threats

Business Continuity Planning and Disaster Recovery Planning

Business Continuity Planning

Law, Investigations, and Ethics

Investigation

No comments: