 |
|
|
 Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... |  |  Managing Trust in Cyberspace
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis... |  |  Design Literacy: Understanding Graphic Design
Author and design expert Steven Heller has revisited and revised the popular classic Design Literacy by revising many of the thoughtful essays from the original and mixing in thirty-two new works. Each essay offers a taste of the aesthetic, political, historical, and personal issues that have engaged designers from the late ... |
|
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 |