Home | Amazing | Today | Tags | Publishers | Years | Search 
Virtualization Security: Protecting Virtualized Environments
Virtualization Security: Protecting Virtualized Environments

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices,...

Windows 8 For Dummies
Windows 8 For Dummies

The bestselling tech book of all time, now updated for Windows 8

Microsoft Windows is the operating system that runs nearly 90 percent of the world's computers. Windows 8 will offer new interface updates, cloud-based services, and much more. This update of Andy Rathbone's bestselling Windows guide covers all the...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line
Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line

Bulletproof your organization against data breach, identity theft, and corporate espionage

In this updated and revised edition of Privacy Means Profit, John Sileo demonstrates how to keep data theft from destroying your bottom line, both personally and professionally. In addition to sharing his gripping tale of losing...

Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Crash Proof: How to Profit From the Coming Economic Collapse
Crash Proof: How to Profit From the Coming Economic Collapse

The economic tipping point for the United States is no longer theoretical. It is a reality today. The country has gone from the world's largest creditor to its greatest debtor; the value of the dollar is sinking; domestic manufacturing is winding down - and these trends don't seem to be slowing. Peter Schiff casts a sharp,...

COX-2 Blockade in Cancer Prevention and Therapy (Cancer Drug Discovery and Development)
COX-2 Blockade in Cancer Prevention and Therapy (Cancer Drug Discovery and Development)

The revelation that aspirin and aspirin-like compounds have notable antineoplastic properties has revolutionized cancer research. COX-2 Blockade in Cancer Prevention and Therapy chronicles the evidence and presents exciting new opportunities for the use of cyclooxygenase-2 (COX-2) blockade in the prevention and treatment of cancer. The text...

DC Power System Design for Telecommunications (IEEE Telecommunications Handbook Series)
DC Power System Design for Telecommunications (IEEE Telecommunications Handbook Series)

Straightforward, systematic approach for designing reliable dc power systems for telecommunications

Here is a must-have resource for anyone responsible for designing, installing, and maintaining telecommunications systems. The text explains how to design direct current (dc) power systems that operate at nominal voltages of 24
...

Handbook of Emergency Response to Toxic Chemical Releases: A Guide to Compliance
Handbook of Emergency Response to Toxic Chemical Releases: A Guide to Compliance
This handbook has been prepared as a working reference for the safety officer, the environmental engineer and the consultant. For the safety officer, this handbook provides detailed guidelines and instructions in preparing Right-to- Know Reporting Audits, establishing programs and training employees on hazard awareness, and...
Mycotoxins in Food: Detection and Control
Mycotoxins in Food: Detection and Control
Recent research has increased awareness of chemical residues and natural contaminants in food. At the same time, consumer concerns about food safety have also grown. At a national and international level this has resulted in more stringent imposition of new, legislative limits for a range of mycotoxins which can contaminate food...
Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy