Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Expecting to relax during a routine flight home, I casually glanced through the contents of the airline’s magazine and practically suffered a heart attack. The first feature article was entitled, “How to Live Forever”! Believing for a moment that Becoming Immortal had been scooped, I tore through the magazine...
Network Security: A Beginner's Guide, Second Edition
Network Security: A Beginner's Guide, Second Edition
Essential Skills--Made Easy!

Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...

Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002.

The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two...

Guide to Wireless Network Security
Guide to Wireless Network Security

With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,...

VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
HTML5 Advertising
HTML5 Advertising

Web advertising is changing. What was once a predominantly Flash-based medium is making the switch to HTML5, with the benefit of a plug-in free environment giving a larger audience for ads, and better integration with the page they are featured on. We live in a time where marketers, designers, and developers are confused as to what they can...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

Office 2003 Application Development All-in-One Desk Reference For Dummies
Office 2003 Application Development All-in-One Desk Reference For Dummies
8 books in 1, plus companion Web site with source code!

Your one-stop guide to taking Office 2003 to the next level

So you’re an Office programmer, experienced user, IT professional, or developer. You know there’s lots of power in Office 2003 you’re not using. Help is on...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy