|
|
|
|
Tucci and Usmani's The Business of Photography
So you’ve decided to be a photographer. You studied photography in
college or went to art school, and you’ve come to the point of deciding
that it’s time to hang out your shingle. Or maybe you’re self-taught and
everyone loves your work and says, “Hey, you could make... | | Secure Roaming in 802.11 Networks (Communications Engineering)WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide... | | Protect Your Information With Intrusion Detection (Power)Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an... |
|
|
Intrusion Detection and PreventionIn today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,... | | Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so
many ways that our personal information can be stolen and duplicated
today it is a very serious situation and should be taken very seriously.
From our surfing the Internet to just the simplicity of speaking on a
cell phone to our friends can... | | Certified Ethical Hacker (CEH) Foundation Guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation... |
|
|
|
Result Page: 6 5 4 3 2 1 |