|
|
|
|
Bioinformatics: Converting Data to Knowledge, Workshop SummaryIn 1993 the National Research Council’s Board on Biology established a series of forums on biotechnology. The purpose of the discussions is to foster open communication among scientists, administrators, policy-makers, and others engaged in biotechnology research, development, and commercialization. The neutral setting offered by the National... | | Incident Response and Computer Forensics, Second EditionCompletely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in... | | OSSEC Host-Based Intrusion Detection GuideNovember 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,... |
|
Computer and Intrusion Forensics (Artech House Computer Security Series)Computer forensics and intrusion forensics are rapidly becoming mainstream activities in an increasingly online society due to the ubiquity of computers and computer networks. We make daily use of computers either for communication or for personal or work transactions. From our desktops and laptops we access Web servers, e-mail... | | Design and Implementation of Data Mining ToolsFocusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for intrusion detection, Web page surfing prediction, and image classification. Mainly based on the authors’ own research work, the book takes a practical approach to the... | | Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting... |
|
Expert Oracle Application Express
Expert Oracle Application Express, 2nd Edition is newly updated for APEX 5.0 and brings deep insight from some of the best APEX practitioners in the field today. You'll learn about important features in APEX 5.0, and how those can be applied to make your development work easier and with greater impact on your business. Oracle... | | Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more... | | Security and Quality of Service in Ad Hoc Wireless NetworksEnsuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |