I suppose there are several questions that may be running through your head
as you contemplate reading this book: Who is the intended audience for this
book? How is this book different from book ‘x’ (insert your favorite title here)?
Why should I buy it? Because these are all fair questions and I am asking you
to plunk...
If you run a small business, you don’t need us to tell you that the highly competitive
marketplace, unpredictable economic cycles, time pressures, and technological
demands are constantly exerting pressure on your bottom line.
Your business needs the same technologies that large companies do. You need
the...
Digital forensics deals with the acquisition, preservation, examination,
analysis and presentation of electronic evidence. Networked computing,
wireless communications and portable electronic devices have expanded
the role of digital forensics beyond traditional computer crime investigations.
Practically every type of crime now...
Learn, prepare, and practice for CompTIA Security+ SY0-301exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. DVD features three complete practice exams, complete video solutions to the 25...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.
This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...
People often ask me if I think Apple is a company that knows how to make a good
server. My answer is usually a little longer than what those people probably had in
mind. Tim Berners-Lee wrote the first web server in 1989 on a computer running the
NeXTSTEP operating system. At the time, NeXTSTEP was a fledgling,...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.
You’re beyond the basics, so dive right into optimizing Windows® 8—and really put your PC or tablet to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting techniques, and workarounds. It’s all muscle and no fluff. Discover how the experts keep their Windows 8 systems...
As computing and networking technologies are gradually integrated with every
aspect of human lives and activities, computer and network security has become
a critical issue. The Handbook of Security and Networks presents a collection of
recent advances in computer networking and security areas. These include applied...
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...