Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows Server 2008 TCP/IP Protocols and Services
Windows Server 2008 TCP/IP Protocols and Services
This book is a straightforward discussion of the concepts, principles, and processes of many protocols in the TCP/IP protocol suite and how they are supported by Windows Server 2008 and Windows Vista. The focus of this book is on Internet Protocol version 4 (IPv4), referred to as Internet Protocol (IP), and associated transport and network...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living Together: A Legal Guide for Unmarried Couples (13th Edition)
Living together out of wedlock can mean anything, especially in court -- unlike married couples, most unmarried couples don't automatically inherit or receive protection under the law. Consequently, you must document everything from property ownership and children to wills and other estate plans.

An essential resource for any unmarried couple,...

How to Do Everything with Windows XP
How to Do Everything with Windows XP
Get the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing....
Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
Automated Planning: Theory & Practice (The Morgan Kaufmann Series in Artificial Intelligence)
"In recent years, comprehensive texts have been written for several of the other major areas of Artificial Intelligence, including machine learning, natural-language processing, and constraint-satisfaction processing, but until now, the field of planning has been devoid of such a resource, despite the considerable number of advances in and the...
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide
Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide

Praise for Business Continuity Planning for Data Centers and Systems: A Strategic Implementation Guide

"Continuity is a primary business driver. This timely book offers a refreshingly honest road map to informed decision making by one of the mission critical industry's foremost real estate experts....

Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
"The author, who specialises in digital and interactive media, sets out the arguments with a view to readers being able to make informed decisions on the issues before them." -Book Shelf

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more
...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy