A definitive guide to cybersecurity law
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
151 Quick Ideas to Manage Your Time
Too many of us live our lives trying to shoehorn our many activities and responsibilities into too few time slots available. Increasingly for business people, fathers and mothers, even kids—(ineffectively) managing the myriad of activities has become an all-consuming chore. And we're so stressed that our relationships and job...
Botnets: The Killer Web App This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world...
Absolute Beginner's Guide to Security, Spam, Spyware & Viruses
Batten down the hatches! Hackers, spammers and thieves (oh my!) are after you! The mere act of turning on an Internet-connected computer can put you, your family, and your personal finances at risk by exposing you to viruses, scam artists, hackers, identity thieves, and spammers. How do you fight back? ...
Client-side web app development has always been the poor cousin to server-side coding. This started
because browsers and the devices they run on have been less capable than enterprise-class servers. To
provide any kind of serious web app functionality, the server had to do all of the heavy lifting for the
browsers, which was pretty...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |