Home | Amazing | Today | Tags | Publishers | Years | Search 
CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide
Here's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:

Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book...

Particles And the Universe (Physics in Our World)
Particles And the Universe (Physics in Our World)
AS A STUDENT forced to flee Cambridge University during an epidemic in 1665–66, Isaac Newton—later knighted, becoming Sir Isaac—found a lot of time to do experiments. He put this time to good use, discovering the basis for many of the laws of physics he would go on to publish a few decades later. Newton’s equations...
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
Advances in Digital Forensics IV (IFIP International Federation for Information Processing)
ADVANCES IN DIGITAL FORENSICS IV

Edited by: Indrajit Ray and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of...

Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
The law of proportion according to which the several colors are formed, even if a man knew he would be foolish in telling, for he could not give any necessary reason, nor indeed any tolerable or probable explanation of them.
Plato

Despite Plato’s warning, this book is about one of the major unresolved issues in the field of
...
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
Sarbanes-Oxley Internal Controls: Effective Auditing with AS5, CobiT, and ITIL
The passage of the Sarbanes-Oxley Act (SOx) in 2002 almost seems like distant history today. That legislation became effective after a series of accounting scandals led to the failure of several then major corporations, such as Enron and WorldCom, the conviction and imprisonment of multiple key executives, and the failure of the major public...
Encyclopedia of Islam & the Muslim World
Encyclopedia of Islam & the Muslim World
A growing number of scholars and pundits have declared that the twenty-first century will be the era of Islam. Such predictions, whether intended in a positive or negative light, err in failing to appreciate the spread and influence of Islam during the past millennium and a half, especially on the continents of Asia and Africa. Nonetheless, events...
Statistics and Data with R: An applied approach through examples
Statistics and Data with R: An applied approach through examples
R, an Open Source software, has become the de facto statistical computing environment. It has an excellent collection of data manipulation and graphics capabilities. It is extensible and comes with a large number of packages that allow statistical analysis at all levels – from simple to advanced – and in numerous fields...
Absolute Beginner's Guide to Databases
Absolute Beginner's Guide to Databases

Absolute Beginner's Guide to Databases brings the elements of a database together using easy to understand language, perfect for the true beginner. It not only gives specific hands on practice, but also provides an overview of designing, maintaining and using a database. This book covers what databases are used for, why databases are...

UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Forensic Computer Crime Investigation
Forensic Computer Crime Investigation
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest...
Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
Two Bits: The Cultural Significance of Free Software
Two Bits: The Cultural Significance of Free Software
In "Two Bits", Christopher M. Kelty investigates the history and cultural significance of Free Software, revealing the people and practices that have transformed not only software, but also music, film, science, and education. Free Software is a set of practices devoted to the collaborative creation of software source code that is made...
Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy