|
|
|
|
Network Security BibleIf you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how... | | Light Detectors, Photoreceptors, and Imaging Systems in Nature"The book is of value . . . as a source of inspiration for biologists who are intrigued by the subject, as well as for engineers who are looking to biological structures for new ideas."--The Quarterly Review of Biology "Wolken has synthesized information from physics, chemistry, biology, and engineering to provide an... | | |
|
Defend I.T. : Security by ExampleThe battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to... | | Mental Models: Aligning Design Strategy with Human Behavior
There is no single methodology for creating the perfect product—but you can increase your odds. One of the best ways is to understand users' reasons for doing things. Mental Models gives you the tools to help you grasp, and design for, those reasons. Adaptive Path co-founder Indi Young has written a roll-up-your-sleeves book for... | | Advanced CISSP Prep Guide: Exam Q & AGet ready to pass the CISSP exam and earn your certification with this advanced test guide
Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,... |
|
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation"A fascinating and urgently needed exploration of moral responsibility in wartime, focusing on the complex realities and demands since 9/11. This engagingly written and well-researched study challenges each of us to honor our better selves." --Richard Falk, University of California, Santa Barbara
"Felice has written the... | | Securing SCADA SystemsHow to secure systems that weren't built for security
Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security... | | Evaluating Project Decisions: Case Studies in Software EngineeringEffective decisions are crucial to the success of any software project, but to make better decisions you need a better decision-making process. In Evaluating Project Decisions, leading project management experts introduce an innovative decision model that helps you tailor your decision-making... |
|
|
|
Result Page: 6 5 4 3 2 1 |