Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Plan and launch your PPC campaign and keep track of its progress

If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros...

Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies
Every organization, bureau, agency, and corporation has fundamental analytical needs that traditionally require a significant amount of data integration and resources. Whether investigating money laundering, insider trading, insurance fraud, or terrorist behavior, the analytical processes and systems architectures are very similar. In fact, the...
The Vest Pocket Guide to Information Technology
The Vest Pocket Guide to Information Technology
The only IT guide you need

You're busy—very busy. You need reliable, practical answers to your IT questions, and you need them now. The Vest Pocket Guide to Information Technology, Second Edition is a handy pocket problem-solver designed to provide you with the quickest route to a solution. Practical, reader-friendly, and thoroughly...

Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions

Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection...

Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Practical Criminal Investigations in Correctional Facilities
Practical Criminal Investigations in Correctional Facilities
The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside the walls of our prisons. Practical Criminal Investigations in Correctional Facilities gives sound advice to both the long-time...
Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)

Europay, MasterCard, and Visa developed a standard for chip cards, referred to as the EMV, allowing consumers and businesses greater protection against fraud compared with magnetic stripe cards. Implementing Electronic Card Payment Systems provides a comprehensive overview of the EMV chip solution and explains how this technology...

Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Accounting Information Systems
Accounting Information Systems

The sixth edition of ACCOUNTING INFORMATION SYSTEMS provides thorough and up-to-date coverage of accounting information systems and related technologies. It features an early presentation of transaction cycles, as well as an emphasis on ethics, fraud, and the modern manufacturing environment. The book focuses on the needs and responsibilities...

Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy