The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...
Electronics Demystified SHOCK YOURSELF BY LEARNING ELECTRONICS
Now anyone with an interest in electronics can master it„oby reading this book. In Electronics Demystified, best-selling science and math writer Stan Gibilisco provides an effective and painless way to understand the electronics that power so much of modern life.
Working with OpenERP
Enterprise resource planning (ERP) is essential for businesses and this excellent guide will help you successfully implement OpenERP on Windows or Ubuntu. Straightforward enough for non-techies.
Learn to install and configure OpenERP on Windows or Ubuntu
Understand how to enter...
Inventory Accounting : A Comprehensive Guide (Wiley Best Practices) The classical view of inventory data collection is that of employees filling out forms
of various kinds throughout the warehouse and production areas, which are then
forwarded to a central data entry location, where hordes of clerks keypunch the data
into a central computer database. Although this was a reasonably accurate view of
The Best Damn Cybercrime and Forensics Book Period As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the...
|Result Page: 20 19 18 17 16 15 14 13 12 11 |