Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Autonomic Computing and Networking
Autonomic Computing and Networking
Autonomic Computing and Networking presents introductory and advanced topics on autonomic computing and networking with emphasis on architectures, protocols, services, privacy & security, simulation and implementation testbeds. Autonomic computing and networking are new computing and networking paradigms that allow the creation of self-managing...
Mac Security Bible
Mac Security Bible

Your essential, no-holds-barred guide to Mac security threats and solutions

Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Under Attack
Under Attack

The wording "Under Attack" implies a dangerous situation - one that signifies we are currently under assault. In this book, the Celebrity Experts® showcased are in the vanguard of protecting data and sensitive information under threat - the threat of digital information being made available to unscrupulous sources, and at times...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless
Broadband wireless networks bring us closer to the Internet's ultimate destiny of interconnecting everyone, everywhere. But wireless networking can be a bit geeky and nerve-wracking without a proper guide. Let's face it: Networking can be hard.

If you're one of the last holdouts still connected to the Internet by a wire, The Book of...

Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
Secure Compressive Sensing in Multimedia Data, Cloud Computing and IoT (SpringerBriefs in Electrical and Computer Engineering)
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research...
The Journalist's Guide to Media Law: A handbook for communicators in a digital world
The Journalist's Guide to Media Law: A handbook for communicators in a digital world
We are all journalists and publishers now: at the touch of a button we can send our words, sounds and images out to the world. No matter whether you're a traditional journalist, a blogger, a public relations practitioner or a social media editor, everything you publish or broadcast is subject to the law. But which law?

...
Introducing Microsoft WinFX: The Application Programming Interface for the Next Generation of Microsoft Windows, Code Name Longhorn
Introducing Microsoft WinFX: The Application Programming Interface for the Next Generation of Microsoft Windows, Code Name Longhorn

Get a headstart evaluating and programming with Microsoft’s next-generation client operating system. Get an expert, developer-focused introduction to the next generation Windows client operating system. Windows programming authority Brent Rector takes you inside the WinFX application model, explaining how its unified, managed-coded...

Application Administrators Handbook: Installing, Updating and Troubleshooting Software
Application Administrators Handbook: Installing, Updating and Troubleshooting Software

An application administrator installs, updates, optimizes, debugs and otherwise maintains computer applications for an organization. In most cases, these applications have been licensed from a third party, but they may have been developed internally. Examples of application types include enterprise resource planning (ERP), customer resource...

Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)
Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy