 |
|
 Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
 Data Mashups in R
Programmers may spend a good part of their careers scripting code to conform to commercial
statistics packages, visualization tools, and domain-specific third-party software.
The same tasks can force end users to spend countless hours in copy-paste purgatory,
each minor change necessitating another grueling round of formatting tabs and... |  |  Computer Technology Encyclopedia
These days, any attempt to write a full-blown encyclopedia or dictionary of computer
terminology would be an exercise in futility. New terms and buzzwords appear every
day, and information technology fi elds overlap with so many other fi elds it can be hard
to determine if a word is IT, telecommunications, or graphics arts, and so on.... |  |  Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 |