 |
|
 Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open... |  |  CEH v9: Certified Ethical Hacker Version 9 Study Guide
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,... |  |  Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |
|
|
 iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to ... |  |  Hue 1968: A Turning Point of the American War in Vietnam
“An extraordinary feat of journalism . . . full of emotion and color.”âKarl Marlantes, Wall Street Journal
The first battle book from Mark Bowden since his #1 New York Times bestseller Black Hawk Down, Hue 1968 is the story of the centerpiece of the Tet Offensive and a turning... |  |  |
|
 Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  CentOS 6 Linux Server Cookbook
An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.
-
Delivering comprehensive insight into CentOS server with a series of starting points that show you...
|  |  Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal... |
|
Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |