Home | Amazing | Today | Tags | Publishers | Years | Search 
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Complete Guide to CISM Certification
Complete Guide to CISM Certification

Complete Guide to CISMВ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...

Networking Explained, Second Edition
Networking Explained, Second Edition
Gallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
  • Wireless networks
  • Convergence of voice and data
  • ...
Business Continuity and Disaster Recovery for InfoSec Managers
Business Continuity and Disaster Recovery for InfoSec Managers
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of
...
The CISSP and CAP Prep Guide: Platinum Edition
The CISSP and CAP Prep Guide: Platinum Edition

An extensively updated version of the bestselling single-source study guide on the market, The CISSP and CAP Prep Guide: Platinum Edition, provides a complete study resource for the full spectrum of security certifications. It provides unparalleled breadth and depth of coverage of the numerous major changes to the CISSP exam, the new...

Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Critical Incident Management
Critical Incident Management
This text presents an overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations.

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they...

Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)
Noise Sources in Turbulent Shear Flows: Fundamentals and Applications (CISM International Centre for Mechanical Sciences)

The articles in this volume present the state-of-the-art in noise prediction, modeling and measurement. The articles are partially based on class notes provided during the course `Noise sources in turbulent shear flows', given at CISM on April 2011. The first part contains general concepts of aero acoustics, including vortex sound theory...

Biomechanical Modelling at the Molecular, Cellular and Tissue Levels (CISM International Centre for Mechanical Sciences)
Biomechanical Modelling at the Molecular, Cellular and Tissue Levels (CISM International Centre for Mechanical Sciences)
This volume consists of Lecture Notes based on lectures delivered at the Advanced School on "Biomechanical Modelling at the Molecular, Cellular and Tissue Levels" held at the International Centre for Mechanical Sciences (CISM) in Udine, Italy, in the period September 11-15, 2006. The course was presented by 6 lecturers, 2 from Europe, 3...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Auditor's Guide to Information Systems Auditing
Auditor's Guide to Information Systems Auditing

Praise for Auditor′s Guide to Information Systems Auditing

"Auditor′s Guide to Information Systems Auditing is the most comprehensive book about auditing that I have ever seen. There is something in this book for everyone. New auditors will find this book to be their bible—reading it will enable them to learn what...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy