Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Encyclopedia of Security

Buy

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources and types of attacks, countermeasures, policies, and more. You get clear, concise explanations and case scenarios that deftly take you from concept to real-world application—ready answers to help maximize security for your mission-critical systems and data.

  • Know your vulnerabilities—understand the ways that black-hat attackers footprint and enumerate systems, exploit security holes, crack passwords, elevate privileges, and cover their tracks.
  • Deploy your defenses—review fundamental concepts of intrusion detection systems, encryption technologies, virus protection, and computer forensics.
  • Stay one step ahead—keep pace with emerging security technologies, such as Wi-Fi Protected Access and XML Encryption; recent government legislation; and the latest industry trends.
  • Decipher security acronyms—from AES to XMLDSIG and 3DES to 802.11i, decode essential terms.
  • Build your own network of resources—from professional associations and standards organizations to online communities and links to free information, know how to stay current.
  • Get an edge in certification preparation—ideal reference for anyone pursuing Security+, MCSE: Security, CISSP, GIAC, and other professional certifications.
(HTML tags aren't allowed.)

American Breakdown: The Trump Years and How They Befell Us
American Breakdown: The Trump Years and How They Befell Us
How Trump got to the Oval Office—and how both parties and the mainstream media are keeping him there

Donald Trump’s residency in the White House is not an accident of American history, and it can’t be blamed on a single cause. In American Breakdown, David Bromwich provides an essential analysis of...

Locating Maldivian Women’s Mosques in Global Discourses
Locating Maldivian Women’s Mosques in Global Discourses

In this ethnographic examination of women’s mosques in the Maldives, anthropologist Jacqueline H. Fewkes probes how the existence of these separate buildings?where women lead prayers for other women?intersect with larger questions about gender, space, and global Muslim communities. Bringing together ethnographic insight with...

Introduction to Digital Video, Second Edition
Introduction to Digital Video, Second Edition
Covers the essential fundamentals of digital video: from video principles, to conversion, compression, coding, interfaces and output.

Written for television professionals needing to apply digital video systems, equipment and techniques to multimedia and /or digital TV applications, as well as for computer system designers, engineers,
...

The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
The Internet and Its Protocols: A Comparative Approach (The Morgan Kaufmann Series in Networking)
"Not only is this book thorough in covering the networking technologies and the applications of todays communications networks, it also guides you to comprehensive understanding of problems and solutions. This should be mandatory reading for every professional in our business."
--Loa Andersson, TLA-group, IETF MPLS working group
...
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
PIC Robotics: A Beginner's Guide to Robotics Projects Using the PIC Micro
Complete, do-it-yourself robotics projects!

SMART 'BOTS!

* Artificial vision system that uses a CCD camera to track and follow brightly colored objects
* Bi-pedal robots that walk upright
* Functional robotic arm
* Easily programmed behavior-based robots
* Complete parts
...
Internet Forensics
Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy