Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology
Driven by the need and desire to reduce costs, organizations are faced with a set of decisions that require analytical scrutiny. Enterprise Architecture A to Z: Frameworks, Business Process Modeling, SOA, and Infrastructure Technology examines cost-saving trends in architecture planning, administration, and management....
Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
The HIPAA Program Reference Handbook
The HIPAA Program Reference Handbook
Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured. No one has been able to clearly explain to them the ramifications of HIPAA. Until now. The HIPAA...
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts,...
WiMAX: Taking Wireless to the MAX
WiMAX: Taking Wireless to the MAX
With market value expected to reach $5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what...
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
In many ways, this is almost the hardest chapter to pen in this book; in writing
this, I am forced to relive the many occasions on which I have stood in
a bookstore leafing through a technical book, trying to determine its value
to the technical “excursion” I am currently embarked on. I generally start
with the
...
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Handbook of Mobile Broadcasting: DVB-H, DMB, ISDB-T, AND MEDIAFLO (Internet and Communications)
Consumption of media has grown rapidly in the previous decade due to advances in digital technology. In recent years, the wireless industry has seen explosive growth in device capability. Everincreasing computing power, memory, and high-end graphic functionalities have accelerated the development of new and exciting wireless services. Personal...
WiMAX: A Wireless Technology Revolution
WiMAX: A Wireless Technology Revolution
The demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology's global development and deployment...
Understanding IPTV (Informa Telecoms & Media)
Understanding IPTV (Informa Telecoms & Media)
Just when we thought we had mastered modern communications-related acronyms, a new one has appeared. That acronym, IPTV, which is the subject of this book, represents an emerging technology that could change the manner by which we receive home entertainment, obtain training, operate our personal computers, and even use our cell phones. The acronym...
Patterns for Performance and Operability: Building and Testing Enterprise Software
Patterns for Performance and Operability: Building and Testing Enterprise Software
Structured to follow the software life cycle, Patterns for Performance and Operability provides advice and examples-based instructions at every phase. You can read it from start to finish or go directly to those chapters that interest you the most. Whatever approach you choose, you will learn:

How to:

·...

Result Page: 19 18 17 16 15 14 13 12 11 10 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy