Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions

Lock down next-generation Web services

"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook

...

LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Besieged: An Encyclopedia of Great Sieges From Ancient Times To The Present
Civilization began with the creation of cities, the congregation of people for mutual support. By their very decision to assemble and collect resources, cities became targets for raiding populations that found taking someone else’s possessions easier than producing their own. The need for defense meant that the towns soon built walls around...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
The Action Principles
The Action Principles
A path to independence, success and happiness. -- Dr. Denton Cooley, President, Texas Heart Institute

I love the Action Principles book! -- Rev. David O'Connell, President, Catholic University

The Action Principles is an outstanding book that will benefit every reader. -- Ross Perot
...
Ninja Mind Control
Ninja Mind Control
Now you can unlock the ancient secrets of Ninja mind control and discover for yourself the fantastic powers of the legendary Ninja warriors. By combining simple methods of meditation with aggressive maneuvers, you can become the master of any situation--from the author of Ninja Secrets of Invisibility.

NINJA MIND CONTROL is, without
...
RF & Wireless Technologies (Newnes Know It All)
RF & Wireless Technologies (Newnes Know It All)
RF & wireless technology enables laptops, cell phones, portable video games and much more - engineers can "Know It All with Newnes!"

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key
...
Computer Simulation of Shaped Charge Problems
Computer Simulation of Shaped Charge Problems
Devoted to the subject of shape charge design using numerical methods, this book offers the defense and commercial industries unique material not contained in any other single volume. The coverage of the Lagrangian and Eulerian methods as well as the equation of state provides first hand help to engineers working on shape charge problems. The book...
Multimedia Forensics and Security
Multimedia Forensics and Security
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,...
Java Programming 10-Minute Solutions
Java Programming 10-Minute Solutions

The problems encountered by a beginning Java programmer are many—and mostly minor.

The problems you encounter as an experienced Java programmer are far fewer—and far more serious.

Java Programming 10-Minute Solutions provides direct solutions to the thorny...

Explosives and Chemical Weapons Identification (Forensic Science Techniques)
Explosives and Chemical Weapons Identification (Forensic Science Techniques)
I have thought long and hard about this book. This book was not created to make money. It was created to save lives — the lives of first responders and the people they have dedicated their lives to protect, the general public.

What is a first responder? It is a phrase often mentioned in the press but rarely defined.
...
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy