Home | Amazing | Today | Tags | Publishers | Years | Search 
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

High Performance Computer Architecture (3rd Edition) (Addison-Wesley Series in Electrical and Computer Engineering)
High Performance Computer Architecture (3rd Edition) (Addison-Wesley Series in Electrical and Computer Engineering)
Teaching computer architecture is an interesting challenge for the instructor because the field is in constant flux. What the architect does depends strongly on the devices available, and the devices have been changing every two to three years, with major breakthroughs once or twice a decade. Within the brief life of the first edition of this...
Geekonomics: The Real Cost of Insecure Software
Geekonomics: The Real Cost of Insecure Software
You may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The...
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
Practical Aspects of Interview and Interrogation-Soft Cover
Practical Aspects of Interview and Interrogation-Soft Cover
What makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,...
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living together out of wedlock can mean anything, especially in court -- unlike married couples, most unmarried couples don't automatically inherit or receive protection under the law. Consequently, you must document everything from property ownership and children to wills and other estate plans.

An essential resource for any unmarried couple,...

Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Microsoft Access 2002 Programming in 24 Hours
Sams Teach Yourself Access 2002 Programming in 24 Hours will considerably improve the quality of the database applications that the reader can create with Microsoft Access. Concise tutorials that quickly bring the reader up to speed will be the goal of each chapter. Having completed this book, the readers will be able to understand any sample VBA...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy