 |
|
|
|
|
 |  |  Aggressive Network Self-DefenseI'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
... |  |  Socially Responsible IT Management"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst
"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social... |
|
|
 Malware Detection (Advances in Information Security)Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many... |  |  The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the InternetAccording to a recent survey by the Travel Industry Association of America, nearly 80 million Americans turned to the Internet for help with travel planning in 2005. The same survey reports that the Internet is now used for some aspect of travel planning in more than 75 percent of all trips. You can count on these numbers rising in the years ahead.... |  |  Cognitive Superiority: Information to Power
In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 |