|
|
Confessions of a Public Speaker
"At 7:48 a.m. on a Tuesday, I am showered, cleaned, shaved, pruned, fed, and deodorized, wearing a pressed shirt and shiny shoes, in a cab on my way to the San Francisco waterfront I'm far from home, going to an unfamiliar place, and performing for strangers, three stressful facts that mean anything can happen "
... | | | | Cyber Security Essentials
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and... |
|
Visual C# Game Programming for Teens
Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the... | | E-Mail Security: A Pocket Guide
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,... | | Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |
|
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 |