|
|
|
|
|
| | | | Handbook of Database Security: Applications and TrendsDatabase security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of... |
|
|
| | Return of the Grizzly: Sharing the Range with Yellowstone's Top Predator
The Yellowstone grizzly population has grown from an estimated 136 bears when first granted federal protection as a threatened species to as many as 1,000 grizzlies in a tri-state region today. No longer limited to remote wilderness areas, grizzlies now roam throughout the region—in state parks, school playgrounds, residential ... | | Halting the Hacker: A Practical Guide to Computer Security (With CD-ROM)Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Fully updated for today's key threats, tools, and solutions, this book shows you how hackers... |
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |