Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
Foundations of Mac OS X Leopard Security (Books for Professionals by Professionals)
A common misconception in the Mac community is that the Mac is more secure than any other operating system on the market. Although this might be true in most side-by-side analyses of security features right out of the box, what this isn’t taking into account is that security tends to get overlooked once the machine starts to be configured for...
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)

Industrial energy efficiency is one of the most important means of reducing the threat of increased global warming. Research however states that despite the existence of numerous technical energy efficiency measures, its deployment is hindered by the existence of various barriers to energy efficiency. The complexity of increasing energy...

The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
The E-Privacy Imperative : Protect Your Customers' Internet Privacy and Ensure Your Company's Survival in the Electronic Age
With their potential for vicious customer backlash and devastating sales drops, Internet privacy infractions--such as selling e-mail lists and personal data or operating an insecure site where credit-card or competitive-pricing information can be stolen--have become deadly serious business concerns.

The E-Privacy Imperative is...

Collaborative Computer Security and Trust Management (Premier Reference Source)
Collaborative Computer Security and Trust Management (Premier Reference Source)

Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Advanced Persistent Training: Take Your Security Awareness Program to the Next Level
Advanced Persistent Training: Take Your Security Awareness Program to the Next Level

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book...

Terminal Services for Microsoft Windows Server 2003: Advanced Technical Design Guide
Terminal Services for Microsoft Windows Server 2003: Advanced Technical Design Guide

This book is not an administrator’s guide. Rather, it’s written for IT consultants, system engineers, and architects who must plan, design, implement, and optimize Windows 2003-based Terminal Server systems. It's filled with real-world, proven strategies created specifically for Windows Server 2003. See how some of the world's...

Official (ISC)® Guide to the CISSP®-ISSEP® CBK®
Official (ISC)® Guide to the CISSP®-ISSEP® CBK®

Official (ISC)2В® Guide to the CISSP-ISSEPВ® CBKВ® provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, it promotes understanding of the four ISSEP domains. It explains ISSE by comparing it to a traditional Systems Engineering model,...

Suicide by Democracy: an Obituary for America and the World
Suicide by Democracy: an Obituary for America and the World
merica and the world are in the process of collapse from excessive population growth, most of it for the last century, and now all of it, due to 3rd world people. Consumption of resources and the addition of 4 billion more ca. 2100 will collapse industrial civilization and bring about starvation, disease, violence and war on a staggering scale....
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)
The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)

In this revised and updated edition of The Rights of Public Employees, Robert M. O’Neil broadens the focus from government employees to all public employees, emphasizing the public-service nature of the occupations and professions of such individuals. Using a question-and-answer format, O’Neil covers such topics as...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy