Home | Amazing | Today | Tags | Publishers | Years | Search 
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
Global Nonlinear Dynamics for Engineering Design and System Safety (CISM International Centre for Mechanical Sciences (588))
This is the first book which exploits concepts and tools of global nonlinear dynamics for bridging the gap between theoretical and practical stability of systems/structures, and for possibly enhancing the engineering design in macro-, micro- and nano-mechanics. Addressed topics include complementing theoretical and practical stability to achieve...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Advances of Soft Computing in Engineering (CISM International Centre for Mechanical Sciences)
Advances of Soft Computing in Engineering (CISM International Centre for Mechanical Sciences)

The articles in this book present advanced soft methods related to genetic and evolutionary algorithms, immune systems, formulation of deterministic neural networks and Bayesian NN. Many attention is paid to hybrid systems for inverse analysis fusing soft methods and the finite element method. Numerical efficiency of these soft methods is...

SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Payment Card Industry Data Security Standard Handbook
Payment Card Industry Data Security Standard Handbook

Praise for Payment Card Industry Data Security Standard Handbook

"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...

Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
The book presents an updated state-of-the-art overview of dynamic methods for structural health monitoring and damage detection in structures, with special emphasis on advanced research in the field today. The topic is treated as a series of lessons, explaining both theoretical and experimental aspects of dynamic non-destructive methods and their...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access...
The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy