Home | Amazing | Today | Tags | Publishers | Years | Search 
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

19 Deadly Sins of Software Security (Security One-off)
19 Deadly Sins of Software Security (Security One-off)

This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man...

Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Automating Windows With Perl
Automating Windows With Perl
Perl is the perfect language for achieving Automation in Windows because it combines a painless Visual Basic style of coding with Perl's strength as a scripting language for process communications. The new multitasking and networking approaches with 32-bit Windows require a radical departure from previous programming techniques. This book,...
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
The Traveler's Web: An Extreme Searcher Guide to Travel Resources on the Internet
According to a recent survey by the Travel Industry Association of America, nearly 80 million Americans turned to the Internet for help with travel planning in 2005. The same survey reports that the Internet is now used for some aspect of travel planning in more than 75 percent of all trips. You can count on these numbers rising in the years ahead....
Hacking Exposed Web Applications, 2nd Ed.
Hacking Exposed Web Applications, 2nd Ed.

Implement bulletproof e-business security the proven Hacking Exposed way

Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,...

Advanced Methods for Knowledge Discovery from Complex Data
Advanced Methods for Knowledge Discovery from Complex Data
This book brings together research articles by active practitioners and leading researchers reporting recent advances in the field of knowledge discovery. An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data mining. This provides the context for the subsequent chapters on methods...
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
The CISSP and CAP Prep Guide: Platinum Edition
The CISSP and CAP Prep Guide: Platinum Edition

An extensively updated version of the bestselling single-source study guide on the market, The CISSP and CAP Prep Guide: Platinum Edition, provides a complete study resource for the full spectrum of security certifications. It provides unparalleled breadth and depth of coverage of the numerous major changes to the CISSP exam, the new...

CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy