|
|
|
|
The International Handbook of Computer SecurityThis book is a one-stop resource to help executives and computer professionals protect their systems and data from a myriad of internal and external threats. Addressing a wide range of security issues, it provides practical guidance on topics such as: physical security procedures * data preservation and protection * hardware and software protection... | | Graph Theory (Graduate Texts in Mathematics)and guided mainly by the Four-Colour Conjecture. The resolution of the conjecture by K. Appel and W. Haken in 1976, the year in which our first book Graph Theory with Applications appeared, marked a turning point in its history. Since then, the subject has experienced explosive growth, due in large measure to its role as an essential structure... | | Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... |
|
Vmware Vcloud Security
Welcome to VMware vCloud Security. In this book, you will learn how to mitigate the security threats on a private cloud running VMware vCloud Director. This book will enable the reader with the knowledge, skills, and abilities to build a highly secured private cloud running VMware vCloud. We will also look at a ... | | Therapy After Terror: 9/11, Psychotherapists, and Mental Health"A licensed, clinical social worker, Seeley (anthropology, Columbia Univ.) offers a riveting, comprehensive examination of the work and experiences of psychotherapists following 9/11. [...] At the heart of the book is Seeley's discussion of "trauma contagion", a phenomenon she distinguishes from vicarious trauma. [...] Integrating... | | Hacking For Dummies
Updated for Windows 8 and the latest version of Linux
The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully... |
|
|
Intrusion Prevention and Active Response : Deploying Network and Host IPSFrom the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be... | | Microcomputer Quantum MechanicsHow sad to learn a language and then to have nothing to say. This is, however, a very common situation in computing. Students learn how to write simple programs, but there is often nothing upon which they can test their new-found skills and no way of building upon their experience by using the computer on real or even realistic problems. Dr... | | Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... |
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |