|
|
|
|
|
|
|
Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | The Politics of Operations: Excavating Contemporary Capitalism
In The Politics of Operations Sandro Mezzadra and Brett Neilson investigate how capital reshapes its relation with politics through operations that enable the extraction and exploitation of mineral resources, labor, data, and cultures. They show how capital—which they theorize as a direct political actor—operates ... | | Security Planning and Disaster RecoverySecrets and strategies for protecting your network before trouble strikes
Create and implement a successful security system and recovery plan with help from this insightful and practical resource. This detailed guide provides you with a complete roadmap for developing an effective end-to-end security program. You’ll even... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |