|
|
AVIEN Malware Defense Guide for the EnterpriseMembers of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected... | | | | |
|
Advanced CISSP Prep Guide: Exam Q & AGet ready to pass the CISSP exam and earn your certification with this advanced test guide
Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,... | | Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers (Lecture Notes in Computer Science)This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH 2007, held in Saint Malo, France, in June 2007.
The 25 revised full papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on new steganographic schemes,... | | Handbook of Digital and Multimedia Forensic EvidenceHandbook of Digital and Multimedia Forensic Evidence presents an overview of computer forensics perfect for beginners. This volume will serve as a foundation and guide for: (a) students considering a career in this field; (b) the law enforcement investigator assigned to work cybercrimes; (c) establishing training programs for forensic... |
|
|
Information Security Management Handbook, Sixth Edition (Isc2 Press)A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion... | | The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... | | |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 |