|
|
|
|
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they... | | | | Pro SQL Server Disaster RecoveryMany would argue that the single, most important job of a SQL Server database administrator is to be able to recover your database in the event of loss or damage. Pro SQL Server Disaster Recovery helps you meet that goal by showing you how to think about and plan for potential problems. You’ll learn to anticipate and reduce the... |
|
|
Linux Mint Essentials
A practical guide to Linux Mint for the novice to the professional
About This Book
-
Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
-
Covers everything you need to know in order to be productive, including browsing the...
| | Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... | | Information Resources in Toxicology, Fourth EditionThis latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium... |
|
Planning for Survivable NetworksKeep your network safe from security disasters with a dependable recovery strategy
Companies are finally learning that a network disaster recovery plan is mandatory in these times, and they must be prepared to make difficult choices about network security.
In the information-packed pages of this book, Annlee Hines shares her... | | Mastering Microsoft Windows Vista Home: Premium and BasicIn-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic
Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,... | | Handbook of Wireless Networks and Mobile Computing
The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |