Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.

The language...

Backup Exec 9 : For Windows Servers
Backup Exec 9 : For Windows Servers
The authors of this text provide an overview of the world of data protection and familiarize the reader with general backup concepts. Learn different types of backup and strategies, find out how to best protect your data, and much more.

Managing a backup rotation is a woefully underestimated chore that often finds itself delegated to an
...
High Availability and Disaster Recovery: Concepts, Design, Implementation
High Availability and Disaster Recovery: Concepts, Design, Implementation

Companies and other organizations depend more than ever on the availability of their Information Technology, and most mission critical business processes are IT-based processes. Business continuity is the ability to do business under any circumstances and is an essential requirement modern companies are facing. High availability and disaster...

The Florentine Villa: Architecture History Society (The Classical Tradition in Architecture )
The Florentine Villa: Architecture History Society (The Classical Tradition in Architecture )
Scholarly and innovative with visually stunning line drawings and photographs, this volume provides readers with a compelling record of the unbroken pattern of reciprocal use and exchange between the countryside and the walled city of Florence, from the thirteenth century up to the present day. Defying the traditional and idealized interpretation...
The Executive Guide to Information Security: Threats, Challenges, and Solutions
The Executive Guide to Information Security: Threats, Challenges, and Solutions

The book provides a pragmatic approach to evaluating security at a companyand putting together an effective information security program. The bookfocuses on three key themes; People, Processes, and Technology and isorganized according to the steps executives would follow in order to developan information security program for their company....

Protected Mode Software Architecture (PC System Architecture Series)
Protected Mode Software Architecture (PC System Architecture Series)

Protected Mode Software Architecture helps readers understandthe problems that single-task and multitasking operating systems must dealwith, and then examines each component of both the real and protected modesoftware architectures. This book is organized into three parts. Part One:Background introduces the reader to the problems faced...

Implementing Voice over IP
Implementing Voice over IP
In general, voice transmission over the Internet protocol (IP), or VoIP, means
transmission of real-time voice signals and associated call control information
over an IP-based (public or private) network. The term IP telephony is commonly
used to specify delivery of a superset of the advanced public switched
telephone network
...
Intelligent Information Systems and Knowledge Management for Energy: Applications for Decision Support, Usage, and Environmental Protection
Intelligent Information Systems and Knowledge Management for Energy: Applications for Decision Support, Usage, and Environmental Protection
More than ever before, energy is becoming one of the most crucial concerns in economical and industrial development. Intelligent Information Systems and Knowledge Management for Energy: Applications for Decision Support, Usage, and Environmental Protection provides in-depth analysis of the need for a holistic approach for the...
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Blueprints for High Availability
Blueprints for High Availability
"Rely on this book for information on the technologies and methods youll need to design and implement high-availability systems...It will help you transform the vision of always-on networks into a reality."—Dr. Eric Schmidt, Chairman and CEO, Novell Corporation

Your system will crash! The reason could be something as complex as...

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy