Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats
Security Manager's Guide to Disasters: Managing Through Emergencies, Violence, and Other Workplace Threats

Terrorist or criminal attack, fire emergency, civil or geographic disruption, or major electrical failure—recent years have witnessed an increase in the number of natural disasters and man-made events that have threatened the livelihoods of businesses and organizations worldwide. Security Manager’s Guide to Disasters:...

The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The Least Worst Place - How Guantanamo Became the World’s Most Notorious Prison
The prisoner’s cry pierced through the hot Caribbean air. It was not the first time that such a shriek had roused the rest of the detainees from their daily lethargy. But this time it brought them to their feet and unleashed a flurry of noise, as they pounded the cement floors and rattled the wire mesh of their cells. An invisible force...
Unix Unleashed (4th Edition)
Unix Unleashed (4th Edition)
Using Solaris 8 and Linux 7.1 as their reference flavors, Robin Anderson and Andy Johnston (as well as a slew of contributors) show how to be a system administrator--and get all sorts of other work done--in the fourth edition of Unix Unleashed. Significantly different from its predecessors, this book stays generally clear of very basic...
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
Design - Build - Run: Applied Practices and Principles for Production Ready Software Development (Wrox Programmer to Programmer)
This unique and critical book shares no-fail secrets for building software and offers tried-and-true practices and principles for software design, development, and testing for mission-critical systems that must not fail. A veteran software architect walks you through the lifecycle of a project as well as each area of production...
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
Ten Questions About Human Error: A New View of Human Factors and System Safety (Human Factors in Transportation)
Ten Questions About Human Error: A New View of Human Factors and System Safety (Human Factors in Transportation)
The text is extremely straightforward....it will be a valuable read for anyone interested in system safety-no matter what their field. Interesting reading and thought provoking discussions.

IEEE EMBS Journal

Ten Questions About Human Error asks the type of questions frequently posed in
...
Network Security Technologies and Solutions (CCIE Professional Development Series)
Network Security Technologies and Solutions (CCIE Professional Development Series)
Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco.
  • Filter traffic with access...
Fixed Mobile Convergence (McGraw-Hill Communications Series)
Fixed Mobile Convergence (McGraw-Hill Communications Series)
It would be an understatement to say that a book on fixed-mobile convergence is very he was convinced that mobile phones work off the satellites up in the sky—how an educated person in our enlightened times can be so technically unaware! We then kept him amused for about 15 minutes with a description of a highly developed terrestrial...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and...
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy