|
|
|
|
Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... | | CISSP All-in-One Exam Guide, 6th Edition
A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris
Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by... | | The Craft of System Security"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how... |
|
| | | | Asset Protection and Security Management HandbookOverall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and... |
|
Microsoft Encyclopedia of SecurityGet the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources... | | Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you... | | IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... |
|
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |