 |
|
 |  |  OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |  |  Microsoft Office SharePoint Server 2007 Best PracticesGet field-tested best practices and proven techniques for designing, deploying, operating, and optimizing Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0. Part of the new Best Practices series for IT professionals from Microsoft Press®, this guide is written by leading SharePoint MVPs and Microsoft SharePoint... |
|
 Current Issues in Knowledge Management (Premier Reference Source)As global enterprise grows increasingly reliant on electronic data, processes, and procedures, studies of the management of organizational knowledge are emergin at the forefront of critical research.
Current Issues in Knowledge Management combines cutting-edge research on the cultural, technical, organizational, and human... |  |  The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |  |  |
|
 Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... |  |  UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |  |  Network Security Evaluation: Using the NSA IEMAre you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop... |
|
 Canning Spam: You've Got Mail (That You Don't Want)We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |  |  Information Security Management Handbook, Fourth Edition, Volume IIA wonderful supplement [to the study guide]. … [H]eavy on practical examples and real-world scenarios … . [The book is] excellent. - Technical Support, Dec. 2004 This is a must-have book for those preparing for the CISSP exam and for any information security professional. - Zentralblatt MATH 1054, May 2005... |
|
| Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |