 |
|
|
 Hacking Exposed: Network Security Secrets & SolutionsIn today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz... |  |  Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... |  |  Introduction to Focused Ion Beams: Instrumentation, Theory, Techniques and PracticeThe focused ion beam (FIB) instrument has experienced an intensive period of maturation since its inception. Numerous new techniques and applications have been brought to fruition by the tireless efforts of some very innovative scientists with the foresight to recognize the potential of this upstart apparatus. Over the past few years, the FIB has... |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 |