|
|
|
|
|
Behavioral Biometrics: A Remote Access ApproachWith the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need... | | CompTIA Security+ 2008 In DepthSecurity continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,... | | Windows Small Business Server 2011 Administrator's Companion
If you run a small business, you don’t need us to tell you that the highly competitive
marketplace, unpredictable economic cycles, time pressures, and technological
demands are constantly exerting pressure on your bottom line.
Your business needs the same technologies that large companies do. You need
the... |
|
Storage Networks: The Complete ReferenceThis comprehensive guide helps you stay on top of storage networking innovations while understanding the realities of storage networks in the data center. Use the essential concepts of storage networks including architecture, devices, connectivity options, and data organization methods to design and apply comprehensive and successful storage... | | Six Sigma and Beyond: Statistics and Probability, Volume IIIThis text explains the tools of statistics and how to apply them effectively to improve processes and profitability in an organization, and also delineates the importance of collecting, analyzing, and interpreting data.
Researchers and professionals in all walks of life need to use the many tools offered by the statistical world, but... | | Active Defense: A Comprehensive Guide to Network SecurityToday's networks incorporate more security features than ever before, yet hacking grows more common and more severe. Technology alone is not the answer. You need the knowledge to select and deploy the technology effectively, and the guidance of experts to develop a comprehensive plan that keeps your organization two steps ahead... |
|
|
|
Result Page: 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 |