Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Security: Cyber Terror and Cyber Security
Digital Security: Cyber Terror and Cyber Security
These days, it is not unusual for 10- to 12-year-olds to be pub- lishing their own Web sites or for second and third graders to begin computer classes. At the same time, computer games are becoming increasingly popular as major publishing houses continue to churn out educational computer programs for children in pre- school....
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
This book takes a novel approach to the presentation and understanding of a controversial topic in modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was a later version of the term,...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Securing SCADA Systems
Securing SCADA Systems
How to secure systems that weren't built for security

Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...

XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Digital Communications: From E-Mail to the Cyber Community (The Digital World)
Digital Communications: From E-Mail to the Cyber Community (The Digital World)

Between September 2006 and May 2007, the online networking site Facebook doubled its number of visitors to 26 million. Today, it has more than 300 million active users worldwide. Though Facebook is just one tool people use to connect with each other, the myriad of other Web sites such as MySpace and the estimated 2 billion cellphones in use...

Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Cyberinfrastructure Technologies and Applications
Cyberinfrastructure Technologies and Applications
Cyberinfrastructure was proposed in a report of the NSF Blue-Ribbon advisory panel in 2003. Cyberinfrastructure will provide a unified environment to access and manage cyber resources, e.g. supercomputers, data archives, software services, scientific instruments and virtual organizations.In this book, the authors review latest research and...
Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2017 (Technologien für die intelligente Automation)
Machine Learning for Cyber Physical Systems: Selected papers from the International Conference ML4CPS 2017 (Technologien für die intelligente Automation)

The work presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It  contains some selected papers from the international Conference ML4CPS – Machine Learning for Cyber Physical Systems, which was held in Lemgo, October 25th-26th, 2017. 

Cyber Physical Systems are...

Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy