|
|
|
|
Industrial Power Engineering Handbook (Newnes Power Engineering Series)Never before has so much ground been covered in a single volume reference source. This five-part work is sure to be of great value to students, technicians and practicing engineers as well as equipment designers and manufacturers, and should become their one-stop shop for all information needs in this subject area.
This book will be of... | | Data ProtectionAt first sight, Data Protection may not appear to affect the library professional unduly. The 1998 Data Protection Act only applies to information about people. Most of the material held in a typical library will not be covered.
But this first impression would be wrong. Librarians deal with people every day. They hold information about... | | Firewall Policies and VPN ConfigurationsDeploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will... |
|
Fundamentals of Cryptology: A Professional Reference and Interactive TutorialThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... | | Multimedia Forensics and SecurityAs information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... | | Enterprise Systems Backup and Recovery: A Corporate Insurance PolicyThis volume provides organizations with a comprehensive understanding of the principles and features involved in effective enterprise backups. Rather than focusing on any individual backup product, this book recommends corporate procedures and policies that need to be established for comprehensive data protection. It provides relevant information... |
|
Mastering System Center Configuration Manager 2007 R2Mastering System Center Configuration Manager 2007 provides intermediate and advanced coverage of all aspects of the product, including planning and installation, upgrading Systems Management Server 2003, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2007 with scripts. ... | | Security Engineering: A Guide to Building Dependable Distributed Systems"If you’re even thinking of doing any security engineering, you need to read this book. It’s the first, and only, end-to-end modern security design and engineering book ever written."–Bruce Schneier
"Many people are anxious about Internet security for PCs and servers," says leading expert Ross Anderson,... | | |
|
Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... | | | | Practical Unix & Internet Security, Second EditionThis book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum... |
|
|
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |