Home | Amazing | Today | Tags | Publishers | Years | Search 
The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
Over the past few years I’ve been exposed to many different IT environments as part of a wide range of SOA initiatives for clients in both private and public sectors. While doing some work on a project for a client in the defense industry, I had an opportunity to learn more about not just their technical landscape, but also the various...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Understanding Knowledge as a Commons: From Theory to Practice
Understanding Knowledge as a Commons: From Theory to Practice
Knowledge in digital form offers unprecedented access to information through the Internet but at the same time is subject to ever-greater restrictions through intellectual property legislation, overpatenting, licensing, overpricing, and lack of preservation. Looking at knowledge as a commons--as a shared resource--allows us to understand both its...
Oracle Data Guard 11gR2 Administration Beginner's Guide
Oracle Data Guard 11gR2 Administration Beginner's Guide

If you're an Oracle Database Administrator it's almost essential to know how to protect and preserve your data. This is the perfect primer to Data Guard that covers all the bases with a totally practical, user-friendly approach.

Overview

  • Understand the essentials and components of Oracle Data...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

Sams Teach Yourself SQL in 24 Hours (3rd Edition)
Sams Teach Yourself SQL in 24 Hours (3rd Edition)

Sams Teach Yourself SQL in 24 Hours, Third Edition presents the key features of SQL (Structured Query Language) in an easy to understand format with updated code examples, notes, diagrams, exercises, and quizzes. New material covers more information on transactions, constructs, embedded databases, and object-oriented programming. In this...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy