Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts of the Department of Defense,...

Freud and His Critics
Freud and His Critics
Wars against Freud have been waged along virtually every front during the past decade. Now Paul Robinson takes on three of Freud's most formidable critics, mounting a thoughtful, witty, and ultimately devastating critique of the historian of science Frank Sulloway, the psychoanalyst Jeffrey Masson, and the philosopher Adolf...
The Career Programmer: Guerilla Tactics for an Imperfect World
The Career Programmer: Guerilla Tactics for an Imperfect World

See what reviewers at Slashdot.org have to say about this book!

  • Conquer the problems that all professional programmers routinely face, regardless of language, operating system, or platform
  • Improve your ability to deliver solid code, on time and under budget, in even the most uncooperative...
Applications of Information Systems to Homeland Security And Defense
Applications of Information Systems to Homeland Security And Defense
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...
Hack I.T.: Security Through Penetration Testing
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)
Conformal Array Antenna Theory and Design (IEEE Press Series on Electromagnetic Wave Theory)

This publication is the first comprehensive treatment of conformal antenna arrays from an engineering perspective. There are journal and conference papers that treat the field of conformal antenna arrays, but they are typically theoretical in nature. While providing a thorough foundation in theory, the authors of this publication provide readers...

Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)

Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers!

 

This book delivers complete, focused review for Sun’s...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy