Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
The SSCP Prep Guide: Mastering the Seven Key Areas of System Security
A one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination

This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to...

Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Green Tech: How to Plan and Implement Sustainable IT Solutions
Green Tech: How to Plan and Implement Sustainable IT Solutions
“Green” is a feel-good term. It has positive, earth-friendly connotations, often without much specificity—perfect for marketing purposes. Sustainability, on the other hand, is something we can measure and manage. We are sustainable when our use of resources does not permanently deplete or damage our supply, including natural...
Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Space-Time Design of the Public City (Urban and Landscape Perspectives)
Space-Time Design of the Public City (Urban and Landscape Perspectives)

Time has become an increasingly important topic in urban studies and urban planning. The spatial-temporal interplay is not only of relevance for the theory of urban development and urban politics, but also for urban planning and governance. The space-time approach focuses on the human being with its various habits and routines in the city....

The Future of Public Housing: Ongoing Trends in the East and the West
The Future of Public Housing: Ongoing Trends in the East and the West

Public housing was once an important strand in western housing policies, but is seldom seen as a mainstream policy instrument for the future. In contrast, in many East Asian countries large public housing programs are underway. Behind these generalizations, there are exceptions, too. By including perspectives of scholars from across the...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses
Ninja Innovation: The Ten Killer Strategies of the World's Most Successful Businesses

Innovate or die

For thirty years, Gary Shapiro has observed the world's most innovative businesses from his front-row seat as leader of the Consumer Electronics Association. Now he reveals the ten secrets of "ninja innovators" like Apple, Amazon, Google, Microsoft, and many others.

What does it take to...

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Living Green: The Missing Manual
Living Green: The Missing Manual

Taking care of the earth is more important than ever, but the problems we're facing can seem overwhelming. Living Green: The Missing Manual helps make earth-friendly decisions more manageable by narrowing them down to a few simple choices. This all-in-one resource is packed with practical advice on ways you can help the...

unlimited object storage image
Result Page: 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy