Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)
Understanding and Reducing Landslide Disaster Risk: Volume 4 Testing, Modeling and Risk Assessment (ICL Contribution to Landslide Disaster Risk Reduction)

This book is a part of ICL new book series “ICL Contribution to Landslide Disaster Risk Reduction” founded in 2019. Peer-reviewed papers submitted to the Fifth World Landslide Forum were published in six volumes of this book series. This book contains the followings:

• Five keynote lectures

...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Evaluating Information Systems: Public and Private Sector
Evaluating Information Systems: Public and Private Sector
Companies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.

The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public
...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Biofuels for Transport: An International Perspective
Biofuels for Transport: An International Perspective
The IEA last published a book on biofuels in 1994 (Biofuels). Many developments have occurred in the past decade, though policy objectives remain similar: improving energy security and curbing greenhouse gas emissions are, perhaps more than ever, important priorities for IEA countries. And, more than ever, transportation energy...
Handbook of Stroke (Lippincott Williams & Wilkins Handbook Series)
Handbook of Stroke (Lippincott Williams & Wilkins Handbook Series)

Thoroughly updated to reflect the best current practices in stroke medicine, Handbook of Stroke, Second Edition is a user-friendly one-stop guide to the clinical management of patients with cerebrovascular disorders—from clinical and laboratory assessment, differential diagnosis, and initial management, to medical and...

The MIT Encyclopedia of Communication Disorders
The MIT Encyclopedia of Communication Disorders
A massive reference work on the scale of MITECS (The MIT Encyclopedia of Cognitive Sciences), The MIT Encyclopedia of Communication Disorders will become the standard reference in this field for both research and clinical use. It offers almost 200 detailed entries, covering the entire range of communication and speech disorders in...
Fundamentals of WiMAX: Understanding Broadband Wireless Networking
Fundamentals of WiMAX: Understanding Broadband Wireless Networking

Fundamentals of WiMAX was consciously written to appeal to a broad audience, and to be of value to anyone who is interested in the IEEE 802.16e standards or wireless broadband networks more generally. The book contains cutting-edge tutorials on the technical and theoretical underpinnings to WiMAX that are not available anywhere else,...

Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference
Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference

You're in charge of IT, facilities, or core operations for your organization when a hurricane or a fast-moving wildfire hits. What do you do?

Simple. You follow your business continuity/disaster recovery plan. If you've prepared in advance, your operation or your company can continue to conduct business while...

Critical Essays on Twin Peaks: The Return
Critical Essays on Twin Peaks: The Return

This edited collection offers an interdisciplinary study of Twin Peaks: The Return, the third season of a TV program that has attracted the attention (and appreciation) of spectators, fans, and critics for over two decades. The book takes readers into several distinct areas and addresses the different approaches and the range...

The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
The Covid-19 Vaccine Guide: The Quest for Implementation of Safe and Effective Vaccinations
What you should know about the Covid-19 vaccines from top experts in the field.

As the SARS-Cov2 virus emerged and spread globally in early 2020, unprecedented international efforts began to develop and test vaccines to control the devastating pandemic. This book focuses on the remarkable progress in developing
...
unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy