Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

Structure of Enteric Neurons (Advances in Anatomy, Embryology and Cell Biology)
Structure of Enteric Neurons (Advances in Anatomy, Embryology and Cell Biology)
In this context, it is less important that Langley excluded the striated part of the oesophagus from his definition of the enteric nervous system (ENS). Much more remarkable seems to be that for Langley, a physiologist, structural reasonswere the most decisive for taking the nervous system within the wall of the gastrointestinal...
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness
Configuring Internal Controls for Software as a Service: Between Fragility and Forgiveness

This book taps into an inherent paradox: with the ease of reliance on external, cloud providers to provide robust functionality and regular enhancements comes, as their very own audited service organization control (SOC) reports are quick to point out, the need for client organizations to devise and sustain a system of effective...

The Edges of Fiction
The Edges of Fiction

What distinguishes fiction from ordinary experience is not a lack of reality but a surfeit of rationality – this was the thesis of Aristotle’s Poetics.  The rationality of fiction is that appearances are inverted.  Fiction overturns the ordinary course of events that occur one after the other, aiming to show how...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)
The Art of Agile Practice: A Composite Approach for Projects and Organizations (Advanced & Emerging Communications Technologies)

The Art of Agile Practice: A Composite Approach for Projects and Organizations presents a consistent, integrated, and strategic approach to achieving "Agility" in your business. Transcending beyond Agile as a software development method, it covers the gamut of methods in an organization?including...

Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy