Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

The Official CHFI Study Guide (Exam 312-49)
The Official CHFI Study Guide (Exam 312-49)
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an...
Biomechanical Modelling at the Molecular, Cellular and Tissue Levels (CISM International Centre for Mechanical Sciences)
Biomechanical Modelling at the Molecular, Cellular and Tissue Levels (CISM International Centre for Mechanical Sciences)
This volume consists of Lecture Notes based on lectures delivered at the Advanced School on "Biomechanical Modelling at the Molecular, Cellular and Tissue Levels" held at the International Centre for Mechanical Sciences (CISM) in Udine, Italy, in the period September 11-15, 2006. The course was presented by 6 lecturers, 2 from Europe, 3...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
Dynamic Methods for Damage Detection in Structures (CISM International Centre for Mechanical Sciences)
The book presents an updated state-of-the-art overview of dynamic methods for structural health monitoring and damage detection in structures, with special emphasis on advanced research in the field today. The topic is treated as a series of lessons, explaining both theoretical and experimental aspects of dynamic non-destructive methods and their...
The CISSP and CAP Prep Guide: Platinum Edition
The CISSP and CAP Prep Guide: Platinum Edition

An extensively updated version of the bestselling single-source study guide on the market, The CISSP and CAP Prep Guide: Platinum Edition, provides a complete study resource for the full spectrum of security certifications. It provides unparalleled breadth and depth of coverage of the numerous major changes to the CISSP exam, the new...

Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)
Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)

The articles in this volume present the state-of-the-art in noise prediction, modeling and measurement. The articles are partially based on class notes provided during the course `Noise sources in turbulent shear flows', given at CISM on April 2011. The first part contains general concepts of aero acoustics, including vortex sound theory...

Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

The CISM Prep Guide: Mastering the Five Domains of Information Security Management
The CISM Prep Guide: Mastering the Five Domains of Information Security Management

There is no better way for you to stand out from the crowd of IT professionals than to get your Certified Information Security Manager (CISM) certification from the Information Systems Audit and Control Association (ISACA). Written by the bestselling authors of the CISSP Prep Guide, this comprehensive test guide provides you with all...

Payment Card Industry Data Security Standard Handbook
Payment Card Industry Data Security Standard Handbook

Praise for Payment Card Industry Data Security Standard Handbook

"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...

Result Page: 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy