Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

Invasion of Privacy!  Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers

Pop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to...

Web Search Savvy: Strategies and Shortcuts for Online Research
Web Search Savvy: Strategies and Shortcuts for Online Research
Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locating, retrieving, and evaluating information on the Internet. Utilizing her experience as a reporter working on deadline, author Barbara G. Friedman offers the most effective methods for finding useful and...
Mobile Cloud Computing: Models, Implementation, and Security
Mobile Cloud Computing: Models, Implementation, and Security

Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.

The book begins with an overview of mobile...

Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Create Your Own Employee Handbook: A Legal and Practical Guide
Create Your Own Employee Handbook: A Legal and Practical Guide
Whether your business has a few employees or several thousand, providing them with a handbook that spells out your company's benefits, policies and procedures makes great sense, practically and legally.

Create Your Own Employee Handbook provides all the information and policies managers, HR professionals and business owners need to create their...

Advances in Artificial Intelligence for Privacy Protection and Security
Advances in Artificial Intelligence for Privacy Protection and Security

In this book, we aim to collect the most recent advances in artificial intelligence techniques (i.e. neural networks, fuzzy systems, multi-agent systems, genetic algorithms, image analysis, clustering, etc), which are applied to the protection of privacy and security. The symbiosis between these fields leads to a pool of invigorating ideas,...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Resolving Ethical Dilemmas: A Guide for Clinicians
Resolving Ethical Dilemmas: A Guide for Clinicians
Every day clinicians face ethical dilemmas, many of which result from medical advances and challenges in managed care. How practitioners resolve these challenges has a direct impact on patient care. This timely Third Edition will keep you up to date on a wide range of ethical dilemmas and new ways of thinking about them. Highlights of this edition...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy