Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data Breaches: Crisis and Opportunity
Data Breaches: Crisis and Opportunity
Protect Your Organization Against Massive Data Breaches and Their Consequences

Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events,
...
Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide for PCs
Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide for PCs
The first authoritative guide to optimizing your PC's BIOS

Your PC's BIOS enables your software and hardware to work together. But they can work together better—way better. If you want the best possible PC performance and stability, this book shows you exactly what to tweak, and how to tweak it.

Until...

GFI Network Security and PCI Compliance Power Tools
GFI Network Security and PCI Compliance Power Tools
Use GFI's Tools to Search for Vulnerabilities in Your Network!

For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.
...
Computer Busses
Computer Busses

Computer Busses is a comprehensive guide to busses, from the high-level software interface to the low-level, electrical characteristics and helps readers choose the most appropriate bus for each particular application. The author uses a top-down approach and organizes his presentation into five main areas: PC interfaces, Local busses,...

How Computers Work (8th Edition) (How It Works)
How Computers Work (8th Edition) (How It Works)
A classic is back in its 8th and best edition yet! How Computers Work, 8th Edition is a must-have for anyone interested in the inner-workings of computers. The full-color, detailed illustrations will take you deep inside your PC and show you just how intricate it is. This latest edition has been updated with information on all of the...
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version...

Payment Card Industry Data Security Standard Handbook
Payment Card Industry Data Security Standard Handbook

Praise for Payment Card Industry Data Security Standard Handbook

"While providing insightful guidance on a holistic approach to tackling the Dirty Dozen of PCI, this book also teaches the fundamental principles of information security management. The PCI DSS Handbook is a must-read for all levels of...

Next Generation SSH2 Implementation: Securing Data in Motion
Next Generation SSH2 Implementation: Securing Data in Motion
The most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book
...
 
   
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy