InfoSecurity 2008 Threat Analysis An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks,...
Snort 2.0 Intrusion Detection “Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that
ominous announcement emanating from a robot as it twisted and turned with arms
thrashing and head spinning, we sat galvanized to our televisions waiting for the
intruder to reveal itself.Would this be the end of Will Robinson, as we knew him?
How to Do Everything With Your iPAQ(R) Pocket PC Now you can do more with your iPAQ than you ever thought possible with this easy-to-use guide. Learn to maximize your iPAQ's built-in features and increase functionality with additional applications and accessories. You'll also get step-by-step guidance for using Word, Excel, and Outlook and managing your finances with the Pocket Money application.... Easy Microsoft Windows 7
SEE IT DONE. DO IT YOURSELF.
It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. Fully illustrated steps with simple instructions guide you through every...
Mastering Windows Network Forensics and Investigation
Conduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this...
Incident Response and Computer Forensics, Second Edition
Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios
"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine
"This book is an absolute must-read for anyone who plays a role in...
Guide to Computer Forensics and Investigations
The rapid advance of technology has changed and influenced how we think about gathering digital
evidence. Soon after the attacks on the World Trade Center in New York City on September 11,
2001, many young men and women volunteered to serve their country in different ways. For those
who did not choose the military, options included...
Internet Simplified The content boom on the Internet has been explosive in the past few years with more than a billion people surfing worldwide. Internet Simplified shows beginning level computer users how to get comfortable surfing the web and how to navigate the flood of information once they find what they're looking for. Users will find helpful information on the...
|Result Page: 5 4 3 2 1 |