 |
|
 Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  |  |  Molecular Forensics
Molecular Forensics offers a comprehensive coverage of the increasingly important role that molecular analysis plays within forensic science. Starting with a broad introduction of modern forensic molecular technologies, the text covers key issues from the initial scenes of crime sampling to the use of evidential material in the... |
|
 BackTrack 5 Cookbook
Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
-
Learn to perform penetration tests with BackTrack 5
-
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
-
Provides detailed...
|  |  |  |  Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |
|
 |  |  Phonetics For Dummies
The clear and easy way to get a handle on the science of speech
The science of how people produce and perceive speech, phonetics has an array of real-world applications, from helping engineers create an authentic sounding Irish or Canadian accent for a GPS voice, to assisting forensics investigators identifying the person... |  |  Windows Security Monitoring: Scenarios and Patterns
Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security
Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |