Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Mainta Windows XP
Mainta Windows XP
Perform your own Windows XP maintenance and save $$$ Maintaining Windows XP 10 Easy Steps to Success By Ron Nykiforuk Heres an easy-to-follow program for maintaining your operating system for Windows XP. Dont wait until a virus sneaks in. Or slowness in startup, accessing files and starting programs occurs. It may be much more expensive and time...
Bike, Scooter, and Chopper Projects for the Evil Genius
Bike, Scooter, and Chopper Projects for the Evil Genius
Greetings! Glad that you decided to take an interest in the best hobby you will ever know! Maybe you are already a seasoned garage hacker and have decided to build a few of the projects from this book, adding your own special modifications, of course. Or, maybe you have never thought about taking an angle grinder to a working bicycle, chopping it...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings,...
Hactivism and Cyberwars: Rebels with a Cause
Hactivism and Cyberwars: Rebels with a Cause
This detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics describes the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. The authors provide an explanation of the different strands of hacktivism...
Two Bits: The Cultural Significance of Free Software
Two Bits: The Cultural Significance of Free Software
In "Two Bits", Christopher M. Kelty investigates the history and cultural significance of Free Software, revealing the people and practices that have transformed not only software, but also music, film, science, and education. Free Software is a set of practices devoted to the collaborative creation of software source code that is made...
Trust and Security in Collaborative Computing (Computer and Network Security)
Trust and Security in Collaborative Computing (Computer and Network Security)
Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Practical Internet Security
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook (Contemporary World Issues)
Cybercrime: A Reference Handbook documents the history of computer hacking from free long distance phone calls to virtual espionage to worries of a supposed "cyber apocalypse," and provides accessible information everyone should know. How can a person's identity be stolen? What exactly is a "hacker"? How much damage can a 17...
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy