Home | Amazing | Today | Tags | Publishers | Years | Search 
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Guide to Computer Network Security (Computer Communications and Networks)
Guide to Computer Network Security (Computer Communications and Networks)
Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.

Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...

Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
From the reviews:

"...a useful reference for all biometric security professionals and researchers. The four coauthors have a distinguished combination of academic and professional experience....Overall, readers will be pleased with the style and substance of this book." -Computing Reviews

"This is a comprehensive reviews...

Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
The Numbers Behind NUMB3RS: Solving Crime with Mathematics
Numb3rs looks like a winn3r.”
USA Today

The companion to the hit CBS crime series Numb3rs presents the fascinating way mathematics is used to fight real-life crime

Using the popular CBS prime-time TV crime series Numb3rs as a
...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
X-Ray Spectrometry: Recent Technological Advances
X-Ray Spectrometry: Recent Technological Advances

During the last decade, remarkable and often spectacular progress has been made in the methodological and instrumental aspects of x-ray spectrometry. This progress includes considerable technological improvements in the design and production of detectors as well as significant advances in x-ray optics, special configurations and computing...

Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy