 |
|
|
|
 Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Cryptography and Coding: 13th IMA International Conference, IMACC 2011, Oxford, UK, December 2011
The 13th IMA Conference on Cryptography and Coding was held at the Lady
Margaret Hall, University of Oxford, UK, during December 12–15, 2011. This
event was a 25th anniversary celebration of the very successful biennial IMA
conference series. Traditionally, the conference has taken place at the Royal
Agricultural College,... |  |  Multimedia Systems: Algorithms, Standards, and Industry Practices
Multimedia is now a broad “umbrella” that innovatively combines different fields of
research and industry to produce practical solutions that are used on a wide scale
today. Some of these fields are signal processing, imaging and color science, video and
audio analysis, 2D/3D graphics, information theory, compression,... |
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Cryptography and Network Security: Principles and Practice (5th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |