|
|
|
|
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... | | Evaluating Information Systems: Public and Private SectorCompanies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.
The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public... | | Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... |
|
|
Excel 2007 Dashboards & Reports For Dummies (Computer/Tech)Create dashboards that communicate and get noticed
Use pivot tables and form controls to build reports that mean something
What's the use of putting out reports that no one bothers to read? Properly created dashboards are graphical representations that put data in a context for your audience,... | | Stress Field of the Earth's CrustThis book about rock stress is suitable for students in geosciences and engineering, who need to broaden their horizon about the Stress Field of the Earth´s Crust. The book covers the topic in a way such that geoscience students will be able to grasp the Cauchy Stress Principle without fear of matrix transformations in an exercise.... | | A Guide to Experimental Algorithmics
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations, and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I... |
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |