 |
|
 Master Your Mac: Simple Ways to Tweak, Customize, and Secure OS X
OS X is a lot more than just a pretty face. Sure, the basics are easy, but beneath that gorgeous surface lie countless powerful features.
If you want to go beyond the basics, Master Your Mac will take you there. With tips on everything from organizing your workspace to strengthening your computer's security,... |  |  Information Security: Principles and Practice
Now updated—your expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data.... |  |  Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so
many ways that our personal information can be stolen and duplicated
today it is a very serious situation and should be taken very seriously.
From our surfing the Internet to just the simplicity of speaking on a
cell phone to our friends can... |
|
 |  |  |  |  Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the
fundamentals of advanced network security. The previous edition of this book placed significant
emphasis on intrusion detection, but this edition aims to provide a more balanced approach to
the topic of network defense and countermeasures. As... |
|
|
 VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... |  |  Debian 7: System Administration Best Practices
Learn the best ways to install and administer a Debian Linux distribution
Overview
-
An in-depth look at Debian administration subjects
-
Discover what distinguishes Debian from other Linux distributions
-
Learn how to install, maintain, and administer Debian Linux
... |  |  What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This... |
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |