Home | Amazing | Today | Tags | Publishers | Years | Search 
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

Security of Mobile Communications
Security of Mobile Communications

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a...

Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web...
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
"A fascinating and urgently needed exploration of moral responsibility in wartime, focusing on the complex realities and demands since 9/11. This engagingly written and well-researched study challenges each of us to honor our better selves." --Richard Falk, University of California, Santa Barbara

"Felice has written the
...
FileMaker Pro 10 Bible
FileMaker Pro 10 Bible

FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons with other database development tools; a broad discussion of integration with existing systems and software) through the...

Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Beginning Database Design Solutions (Wrox Programmer to Programmer)
Beginning Database Design Solutions (Wrox Programmer to Programmer)
Databases play a critical role in the business operations of most organizations; they're the central repository for critical information on products, customers, suppliers, sales, and a host of other essential information. It's no wonder that the majority of all business computing involves database applications.

With so much at stake,
...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
3G Marketing on the Internet, Seventh Edition: Third Generation Internet Marketing Strategies for Online Success
For businesses that are either planning to launch a new e-business or increase the profits of an existing one, this book provides techniques and methods to increase effectiveness and growth. Approaches to viewing a company's foundation introspectively through products, services, branding, target markets, online objectives, and budget are discussed,...
FileMaker Pro 9 Bible
FileMaker Pro 9 Bible
"Ray Cologon's contributions to the FileMaker developer community are unsurpassed. When Ray says something, we are all well advised to pay close attention."
— Steven H. Blackwell, FileMaker Pro expert, developer, and author

Before starting a FileMaker Pro development project, get this book

...
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy