Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Auditing (Networking Technology: Security)
Network Security Auditing (Networking Technology: Security)

Mention the word audit to IT professionals and you will probably see their eyes glaze over as they imagine frightening visions of auditors with pointy tails, pitchforks, and checklists run ning around and pointing out all of the things they have done wrong to their manager. The purpose of a security audit is not to place blame or pick...

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
How to Value Your Business and Increase Its Potential
How to Value Your Business and Increase Its Potential
How to Value Your Business and Increase Its Potential takes the complex ideas of value and valuation and places them in terms that virtually all business owners can understand and profit from. Whether you are curious about the monetary value of the business you've created and built, or looking for little-known tips and techniques that will...
Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

Handbook of Research on Web Information Systems Quality
Handbook of Research on Web Information Systems Quality
Web information systems engineering resolves the multifaceted issues of Web-based systems development; however, as part of an emergent yet prolific industry, Web site quality assurance is a continually adaptive process needing a comprehensive reference tool to merge all cutting-edge research and innovations.

The Handbook of Research on Web...

Excel 2010 For Dummies Quick Reference
Excel 2010 For Dummies Quick Reference

Find the answers to your most important Excel questions with this reference

John Walkenbach’s name is synonymous with excellence in computer books that decipher complex technical topics. Known as "Mr. Spreadsheet," Walkenbach—along with Excel expert Colin Banfield—answers your most common and...

Ontologies for Software Engineering and Software Technology
Ontologies for Software Engineering and Software Technology
Communication is one of the main activities in software projects, many such projects fail or encounter serious problems because the stakeholders involved have different understandings of the problem domain and/or they use different terminologies. Ontologies can help to mitigate these communication problems.

Calero and her coeditors mainly...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Data Quality and High-Dimensional Data Analysis: Proceedings of the DASFAA 2008 Workshops
Data Quality and High-Dimensional Data Analysis: Proceedings of the DASFAA 2008 Workshops
The First International Workshop on Data Quality in Collaborative Information Systems was held in conjunction with the 13th International Conference on Database Systems for Advanced Applications, 19-22nd March, 2008, in New Delhi, India. The present volume contains the texts for four accepted papers and two invited papers presented at the workshop,...
Search Engine Optimization (SEO) Secrets
Search Engine Optimization (SEO) Secrets

This book is for the SEO who already knows the basics of SEO and wants to take this knowledge to the next level so that they can make more money. In the SEO industry, the best way I have found to do this is to do SEO consulting.

Tips, tricks, and little-known methods used by professional SEO consultants to rank in some of...

The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards
The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards

Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy