Home | Amazing | Today | Tags | Publishers | Years | Search 
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Software Process Improvement: 13th European Conference, EuroSpi 2006, Joensuu, Finland, October 11-13, 2006, Proceedings
Software Process Improvement: 13th European Conference, EuroSpi 2006, Joensuu, Finland, October 11-13, 2006, Proceedings
This book constitutes the refereed proceeding of the 13th European Software Process Improvement Conference, EuroSPI 2006, held in Joensuu, Finland in October 2006.

The 18 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on SPI (Software Process Improvement)...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
Acustomer stumbling upon this book in a bookstore might ask, “Why is a book on directories and security is so important?”

The Internet is connecting enterprises into a global economy, and the interaction of directories is critical to the success of the New Economy. Consider, for example, Internet commerce in the United
...
Influence Without Authority (2nd Edition)
Influence Without Authority (2nd Edition)
At some point, almost all of us will find ourselves in the same bind at work: we know what needs to be done and how to do it, but we can't get the right people on board. The risk is allowing frustration to become resignation—or unproductive retaliation. Fortunately, the new and improved Influence Without Authority, Second Edition offers a...
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Information Assurance Architecture
Information Assurance Architecture
Safeguard Your Organization’s Information!

Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Tools enabling managers to carry out financial calculations have evolved in the last 20 years from tables through calculators to programs on PCs and personal organisers. Today, the majority of those in finance have Excel on their desks and increasingly on their laptops or pocket computers.

Mastering Financial Mathematics in Microsoft...

Prototyping with Visual Basic
Prototyping with Visual Basic
This book shows readers how to use Visual Basic to gain the benefits of prototyping: reduced cost, reduced time and more importantly, reduced risk while building complex applications.

The techniques and examples described will give the reader new tools for building applications.

About the Author
...

Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle
Managing Systems Migrations and Upgrades: Demystifying the Technology Puzzle
Managing Systems Migrations and Upgrades is the perfect book for technology managers who want a rational guide to evaluating the business aspects of various possible technical solutions. Enterprises today are in the middle of the R&D race for technology leadership, with providers who increasingly need to create markets for new technologies...
Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
Currency Trading For Dummies (Business & Personal Finance)
Currency Trading For Dummies (Business & Personal Finance)
Features forex market guidelines and sample trading plans

The fun and easy way® to get started in currency trading

Want to capitalize on the growing forex market? This nuts-and-bolts guide gives you a step-by-step action plan for understanding and trading the forex market. It offers...

Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy