Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Information Security Management Handbook, Sixth Edition, Volume 2
Information Security Management Handbook, Sixth Edition, Volume 2
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of...
Software Testing and Continuous Quality Improvement, Third Edition
Software Testing and Continuous Quality Improvement, Third Edition

Numerous textbooks address software testing in a structured development environment. By “structured” is meant a well-defined development cycle in which discretely defined steps provide measurable outputs at each step. It is assumed that software testing activities are based on clearly defined requirements and software...

Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management
Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management

Strategic intelligence (SI) has mostly been used in military settings, but its worth goes well beyond that limited role. It has become invaluable for improving any organization's strategic decision making process. The author of Strategic Intelligence: Business Intelligence, Competitive Intelligence, and Knowledge Management recognizes synergies...

WiMAX: A Wireless Technology Revolution
WiMAX: A Wireless Technology Revolution
The demand for broadband connectivity is growing rapidly, but cannot be met effectively by existing wireline technology. WiMAX has the potential to provide widespread Internet access that can usher in economic growth, better education and healthcare, and improved entertainment services. Examining the technology's global development and deployment...
Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)
Theory of Science and Technology Transfer and Applications (Systems Evaluation, Prediction and Decision-Making)

Constructive Suggestions for Efficiently Implementing Technology Transfer

Theory of Science and Technology Transfer and Applications presents the mechanisms, features, effects, and modes of technology transfer. It addresses the measurement, cost, benefit, optimal allocation, and game theory of technology transfer,...

UML for Developing Knowledge Management Systems
UML for Developing Knowledge Management Systems
This book came from a need to establish a way to capture knowledge that can be easily translated into a computer program. To do this I wanted to establish a methodology or framework that would assist me. This framework must be a reusable method for getting this done. However, what should this framework contain? The first thing I wanted to be able...
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Broadband Mobile Multimedia: Techniques and Applications (Wireless Networks and Mobile Communications)
Multimedia service provisioning is believed to be one of the prerequisites to guarantee the success of next-generation wireless networks. Examining the role of multimedia in state-of-the-art wireless systems and networks, Broadband Mobile Multimedia: Techniques and Applications presents a collection of introductory concepts,...
A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Building and Maintaining a Data Warehouse
Building and Maintaining a Data Warehouse
As it is with building a house, most of the work necessary to build a data warehouse is neither visible nor obvious when looking at the completed product. While it may be easy to plan for a data warehouse that incorporates all the right concepts, taking the steps needed to create a warehouse that is as functional and user-friendly as it is...
Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
Implementing and Developing Cloud Computing Applications
Implementing and Developing Cloud Computing Applications

I was first exposed to what would become the Internet way back in 1969, while I was still an undergraduate at Brandeis University working on ARPANet, the forerunner to the present Internet, which operated at the then blazing speed of 2,400 bps, ultimately increased to 50 Kbps (see http://www.computerhistory.org/internet_history/). I...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy