Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
Power and Security in the Information Age: Investigating the Role of the State in Cyberspace
The marriage of computers and telecommunications, the integration of these technologies into a multimedia system of communication that has global reach, and the fact that they are available worldwide at low cost seems to be bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may...
Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Game Character Animation All in One
Game Character Animation All in One
Within the world of video games, characters become almost living entities. Through the use of logic and artificial intelligence, the video-game character is able to act and react to each situation. As the designer, you hold the character's creative expression in your control. Game Character Animation All in One is a comprehensive guide to the...
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
I have spent almost ten years doing the research for, thinking about, and finally writing this book. In the pages that follow, I emphasize the importance of understanding standpoint when critically evaluating information on the Internet, so it seems only fitting that I should say something about my own relation to the text.

This book
...
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Historical Dictionary of Terrorism (Historical Dictionaries of Religions, Philosophies and Movements)
Terrorism has consistently dogged this supposedly modern and enlightened age. It has merely adopted new shapes and forms in keeping with the times. The causes have also evolved over the years, as old problems are solved and new ones created. Moreover, it has gone high-tech, like everything else. Thus, as this book convincingly shows, terrorism will...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)
e-Transformation: Enabling New Development Strategies (Innovation, Technology, and Knowledge Management)

Could information and communication technology (ICT) become the transformative tool for a new style of global development? Could ICT promote knowledge-based, innovation-driven, and smart, adaptive, participatory development? As countries seek a way out of the present period of economic contraction, they are trying to weave ICT into their...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy
The Art of Information Warfare: Insight into the Knowledge Warrior Philosophy

Information is a two edged sword that can both help and hinder modern society. The Art of Information Warfare is the first common-sense primer on the subject written for those interested in or requiring a practical orientation to the threats and issues associated with today's Information Society from military, corporate, and...

Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy