Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Shut Up, Stop Whining, and Get a Life: A Kick-Butt Approach to a Better Life
Shut Up, Stop Whining, and Get a Life: A Kick-Butt Approach to a Better Life
Internationally renowned success philosopher, business speaker, and humorist, Larry Winget offers advice that flies in the face of conventional self-help. He believes that the motivational speakers and self-help gurus seem to have forgotten that the operative word in self-help is "self." That is what makes this book so different. Shut Up,...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Contributions to Ubiquitous Computing (Studies in Computational Intelligence)
Mark Weisers vision of computers moving out of our focus of attention and becoming oblivious devices that occur in large numbers and provide smart computing und communication services to individuals as needed is still far from being reality.

This book puts the larger vision of ubiquitous computing in the context of todays mobile and distributed...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Encyclopedia of Islam & the Muslim World
    Encyclopedia of Islam & the Muslim World
    A growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events...
    Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
    Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

    "This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

    Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
    Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
    The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
    Marketing Fear in America's Public Schools: The Real War on Literacy
    Marketing Fear in America's Public Schools: The Real War on Literacy
    We begin and end this book with chapters on resistance to the agendas of the corporate and political right. In chapter two, Carole Edelsky provocatively outlines both the problem of and the resistance to the marketing of fear being perpetuated by the corporate and political right. She uncovers how teachers known for their critical, holistic...
    Multimedia Content Encryption: Techniques and Applications
    Multimedia Content Encryption: Techniques and Applications

    How to Design a Secure Multimedia Encryption Scheme

    The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...

    Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy