 |
|
|
 Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... |  |  |  |  Intrusion Detection and PreventionIn today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,... |
|
|
 Red Hat Linux 9 Professional SecretsThis ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.
It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how... |  |  A Carrot a Day: A Daily Dose of Recognition for Your EmployeesFrom the bestselling authors of The 24-Carrot Manager comes a manager's handbook on motivating employees through praise and recognition. Employees fed a steady diet of carrots focus better on company goals. They spot new opportunities faster. They have longer employment life spans (translation: lower turnover). And they can lift companies higher... |  |  The Circuit Designer's Companion, Second EditionA unique masterclass in the design of optimized, reliable electronic circuits Beyond the lab a guide to electronic design for production, where cost-effective design is imperative Tips and know-how provide a whole education for the novice, with something to offer the most seasoned professional
Tim Williams' Circuit... |
|
Result Page: 5 4 3 2 1 |