|
|
|
|
|
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that... | | Microsoft Dynamics GP 2010 Cookbook
Microsoft Dynamics GP is an Enterprise Resource Planning system, essentially an accounting system on steroids, designed for mid-sized organizations. The implementation of Dynamics GP is usually considered to be complex, and people often realize there must be more efficient ways of working with the system. This book will show readers how to... | | Mike Meyers' CompTIA Network+ Certification Passport, Third EditionWhat do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just... |
|
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... | | The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... | | Encyclopedia of CybercrimeThe first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and... |
|
Hacking Mac OS X Tiger : Serious Hacks, Mods and CustomizationsThis serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
| | Defend I.T. : Security by ExampleThe battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to... | | |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |