Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blackhatonomics: An Inside Look at the Economics of Cybercrime
Blackhatonomics: An Inside Look at the Economics of Cybercrime

Would you be surprised if I say that the essence of cyber-crime comes down to traditional theft of property—be that of funds in accounts, of company data (and the financial harm that can cause), or of personal/confidential information (and the damage that can cause by it winding up in the wrong hands)? As time goes by, hackers, virus...

Content Networking Fundamentals
Content Networking Fundamentals

A comprehensive introduction to the theory and practical applications of content networking 

  • Get a strong introduction to the basic networking concepts necessary for content networking, including network address translation, IP multicast content delivery, quality of service, and...

CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)

The Exam Cram method of study focuses on exactly what you need to get certified now.

In this book you'll learn how to:

  • Develop a solid foundation of VPN technologies and apply them to Cisco's VPN hardware and software...

Citrix XenApp Platinum Edition for Windows: The Official Guide
Citrix XenApp Platinum Edition for Windows: The Official Guide

The Authorized Guide to Citrix XenApp Platinum Edition for Windows

Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...

Reflectarray Antennas
Reflectarray Antennas
Describes the configuration and principles of a reflectarray antenna, its advantages over other antennas, the history of its development, analysis techniques, practical design procedures, bandwidth issues and wideband techniques, as well as applications and recent developments. Both authors are well respected practitioners who have build these...
Pro Novell Open Enterprise Server
Pro Novell Open Enterprise Server
This book is about Novell Open Enterprise Server. With Open Enterprise Server, Novell launched a new generation of server operating system, following a 20-year long tradition with NetWare. Open Enterprise Server is unique in the industry due to its two versions: one for Linux and another for NetWare. This book is meant as a guide to Open Enterprise...
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services
Introduction to Mobile Telephone Systems: 1G, 2G, 2.5G, and 3G Technologies and Services

If you are involved or getting involved in mobile communication technologies and services, this book is for you. This book explains the different types of mobile telephone technologies and systems from 1st generation digital broadband. It describes the basics of how they operate, the different types of wireless voice, data and information...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Computer Privacy Annoyances
Computer Privacy Annoyances

From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances...

Security in Computing, Third Edition
Security in Computing, Third Edition

Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.

This sweeping revision of the field's classic guide to computer...

Phishing Exposed
Phishing Exposed
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy