Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Geeks On Call Security and Privacy: 5-Minute Fixes
Geeks On Call Security and Privacy: 5-Minute Fixes
Bringing order to the lawless frontier

Almost daily, the boomtown growth of online activity generates more opportunities for cybercrime, identity theft, loss of data, and invasion of your privacy. To this lawless high-tech frontier comes the cavalry, mounted on (or in) blue PT Cruisers—Geeks On Call. Now they're...

Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

The Palgrave Handbook of Philosophy and Public Policy
The Palgrave Handbook of Philosophy and Public Policy
This book brings together a large and diverse collection of philosophical papers addressing a wide variety of public policy issues. Topics covered range from long-standing subjects of debate such as abortion, punishment, and freedom of expression, to more recent controversies such as those over gene editing, military drones, and statues...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

End-to-End Network Security: Defense-in-Depth
End-to-End Network Security: Defense-in-Depth
The network security lifecycle requires specialized support and a commitment to best practice standards. In this book, you will learn best practices that draw upon disciplined processes, frameworks, expert advice, and proven technologies that will help you protect your infrastructure and organization. You will learn end-to-end security best...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Penetration Testing and Network Defense (Cisco Press Networking Technology)
Penetration Testing and Network Defense (Cisco Press Networking Technology)

The practical guide to assessing network vulnerabilities andmanaging security risk.

  • Assess your network's defensive strengths and eliminatevulnerabilities with proven internal testing methodologies

  • Learn how to perform simulated attacks...

RF & Wireless Technologies (Newnes Know It All)
RF & Wireless Technologies (Newnes Know It All)
RF & wireless technology enables laptops, cell phones, portable video games and much more - engineers can "Know It All with Newnes!"

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key
...
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States

Relations between the European Union and China have grown at a sustained pace across the board in recent times, transforming the relationship from one of previous neglect into a matter of global strategic significance. This book offers an examination of the evolution of contemporary EU-China relations in the economic, technological and high...

A Basic Guide for Valuing a Company, 2nd Edition
A Basic Guide for Valuing a Company, 2nd Edition
The Groundwork of Company Valuation for First-time Buyers and Sellers

A Basic Guide for Valuing a Company has helped thousands of first-time buyers and sellers realize a fair, substantiated value for small businesses. Now in its Second Edition, this book covers common valuation techniques and myths, tips for determining tangible and intangible...

Theodore Roosevelt for the Defense: The Courtroom Battle to Save His Legacy
Theodore Roosevelt for the Defense: The Courtroom Battle to Save His Legacy
A President on Trial. A Reputation at Stake.

Dan Abrams and David Fisher take us inside the courtroom to witness the epic case that would define Theodore Roosevelt’s legacy. The former president had accused the leader of the Republican Party of corruption, setting off a trial that caught the attention
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy