 |
|
 |  |  AVIEN Malware Defense Guide for the EnterpriseMembers of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected... |  |  Beginning Game Art in 3ds Max 8Are you an artist ready to try your hand at 3ds Max 8? Beginning Game Art in 3ds Max 8 gives you the skills you need to hit the ground running, covering the basics of this amazing program. It is filled with step-by-step instructions and sample projects from actual games. Fine-tune your new skills as you learn to build objects, environments, and... |
|
|
 The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second EditionPass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!
The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP... |  |  Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |  |  |
|
 Alternate Data Storage ForensicsDigital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital... |  |  |  |  Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |