Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
Complex Networks and Their Applications VII: Volume 1 Proceedings The 7th International Conference on Complex Networks and Their Applications COMPLEX ... 2018 (Studies in Computational Intelligence)
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications...
Wastewater Pathogens (Wastewater Microbiology)
Wastewater Pathogens (Wastewater Microbiology)
A practical guide to wastewater pathogens

Wastewater treatment professionals face daily exposure to a wide variety of pathogens. These include viruses, bacteria, fungi, protozoa, and helminthes, as well as allergins, endotoxins, and exotoxins. While generally minimal, potential health hazards are still cause for concern....

Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Software Metrics and Software Metrology
Software Metrics and Software Metrology

Most of the software measures currently proposed to the industry bring few real benefits to either software managers or developers. This book looks at the classical metrology concepts from science and engineering, using them as criteria to propose an approach to analyze the design of current software measures and then design new software...

Introduction to Data Analysis and Graphical Presentation in Biostatistics with R: Statistics in the Large (SpringerBriefs in Statistics)
Introduction to Data Analysis and Graphical Presentation in Biostatistics with R: Statistics in the Large (SpringerBriefs in Statistics)

Through real-world datasets, this book shows the reader how to work with material in biostatistics using the open source software R. These include tools that are critical to dealing with missing data, which is a pressing scientific issue for those engaged in biostatistics. Readers will be equipped to run analyses and make graphical...

Concise Guide to Object-Oriented Programming: An Accessible Approach Using Java (Undergraduate Topics in Computer Science)
Concise Guide to Object-Oriented Programming: An Accessible Approach Using Java (Undergraduate Topics in Computer Science)

This engaging textbook provides an accessible introduction to coding and the world of Object-Oriented (OO) programming, using Java as the illustrative programming language. Emphasis is placed on what is most helpful for the first-time coder, in order to develop and understand their knowledge and skills in a way that is relevant and...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

International Conference on Advanced Computing Networking and Informatics: ICANI-2018 (Advances in Intelligent Systems and Computing)
International Conference on Advanced Computing Networking and Informatics: ICANI-2018 (Advances in Intelligent Systems and Computing)
This AISC volume contains documented versions of the papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI-2018). The conference was held during February 22–24, 2018, at Medi-Caps University, Indore (Madhya Pradesh), India. The conference was a platform for...
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Distributed Search by Constrained Agents: Algorithms, Performance, Communication
Agent technology is evolving as a leading field of research connected to diverse areas such as A.I., E-commerce, robotics and information retrieval. Agents systems use reasoning and constraint-based reasoning that has a wide potential for representing multiple types of problems. A fundamental building block within all these areas is the ability to...
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
Reliability, Survivability and Quality of Large Scale Telecommunication Systems: Case Study: Olympic Games
The design and implementation of large scale telecommunication systems requires the interconnection and integration of diverse subsystems which need to provide a highly reliable system capable of offering high quality services. Over recent years, large scale systems designers have only had to deal with wireline systems and large scale operations...
unlimited object storage image
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy