Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks,...

Snort 2.0 Intrusion Detection
Snort 2.0 Intrusion Detection
“Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that
ominous announcement emanating from a robot as it twisted and turned with arms
thrashing and head spinning, we sat galvanized to our televisions waiting for the
intruder to reveal itself.Would this be the end of Will Robinson, as we knew him?...
How to Do Everything With Your iPAQ(R) Pocket PC
How to Do Everything With Your iPAQ(R) Pocket PC
Now you can do more with your iPAQ than you ever thought possible with this easy-to-use guide. Learn to maximize your iPAQ's built-in features and increase functionality with additional applications and accessories. You'll also get step-by-step guidance for using Word, Excel, and Outlook and managing your finances with the Pocket Money application....
Easy Microsoft Windows 7
Easy Microsoft Windows 7

SEE IT DONE. DO IT YOURSELF.

 

It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. Fully illustrated steps with simple instructions guide you through every...

Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

.NET Security
.NET Security
  • In-depth coverage of the cryptographic classes in .NET
  • Comprehensive analysis of the .NET security model
  • Detailed coverage of securing ASP.NET applications
  • Useful information on how to secure XML-based data under .NET

When you use .NET to create client- and server-side...

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Linux Security (Networking)
Linux Security (Networking)
This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This...
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Guide to Computer Forensics and Investigations
Guide to Computer Forensics and Investigations

The rapid advance of technology has changed and influenced how we think about gathering digital evidence. Soon after the attacks on the World Trade Center in New York City on September 11, 2001, many young men and women volunteered to serve their country in different ways. For those who did not choose the military, options included...

Internet Simplified
Internet Simplified
The content boom on the Internet has been explosive in the past few years with more than a billion people surfing worldwide. Internet Simplified shows beginning level computer users how to get comfortable surfing the web and how to navigate the flood of information once they find what they're looking for. Users will find helpful information on the...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy