Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Cocos2d-X Game Development Blueprints
Cocos2d-X Game Development Blueprints

Build a plethora of games for various genres using one of the most powerful game engines, Cocos2d-x

About This Book

  • Explore the powerful features of Cocos2d-x and use them to your advantage
  • Tackle commonly faced problems while creating popular 2D games
  • A step-by-step guide...
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
Heroin is universally considered the world's most harmful illegal drug. This is due not only to the damaging effects of the drug itself, but also to the spread of AIDS tied to its use. Burgeoning illegal mass consumption in the 1960s and 1970s has given rise to a global market for heroin and other opiates of nearly 16 million users. The production...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Fiber Optic Sensors, Second Edition (Optical Science and Engineering)
Fiber Optic Sensors, Second Edition (Optical Science and Engineering)
In recent years, fiber optic sensors have developed from the laboratory research and development stage to practical applications. The market for fiber optic sensor technology may be divided into two broad categories of sensors: intrinsic and extrinsic. Intrinsic sensors are used in medicine, defense, and aerospace applications,...
CompTIA RFID+ Study Guide: Exam RF0-101
CompTIA RFID+ Study Guide: Exam RF0-101
This comprehensive study guide thoroughly covers the CompTIA RFID+ exam, the only certification offered for radio frequency identification (RFID), the technology that is rapidly gaining popularity and is expected to completely replace bar codes. Your study will focus on interrogation zone basics, testing and troubleshooting, standards and...
Physical Security for IT
Physical Security for IT
"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each...
Network Science and Cybersecurity (Advances in Information Security)
Network Science and Cybersecurity (Advances in Information Security)

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of  Defense, industry and academic laboratories.

This book examines new algorithms and tools, technology platforms and reconfigurable...

Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical...

Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Slamming Spam : A Guide for System Administrators
Slamming Spam : A Guide for System Administrators

Real Anti-Spam Help for System Administrators

In Slamming Spam, two spam fighters show you how to fight backand win. Unlike most spam books, this one is written specifically for in-the-trenches system administrators: professionals who need...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy