Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Protecting valuable assets from intentional harm has been a focus of human activity from time immemorial. The proliferation of computers in society has meant that many business and mission critical assets are increasingly stored and manipulated by computer-based systems. The scale of misuse of these assets has also increased, because of their...
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing

Well-known security experts decipher the most challenging aspect of cloud computing-security

Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access...

Wireless Operational Security
Wireless Operational Security

Wireless Operational Security addresses the operational and day-to-day security management requirements of 21st Century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Designing for the Digital Age: How to Create Human-Centered Products and Services
Designing for the Digital Age: How to Create Human-Centered Products and Services

Whether you’re designing consumer electronics, medical devices, enterprise Web apps, or new ways to check out at the supermarket, today’s digitally-enabled products and services provide both great opportunities to deliver compelling user experiences and great risks of driving your customers crazy with complicated, confusing...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Artificial Intelligence for Finance Executives: The AI revolution, from industry trends and case studies to algorithms and concepts
Artificial Intelligence for Finance Executives: The AI revolution, from industry trends and case studies to algorithms and concepts

We often hear that AI is revolutionising the financial sector, like no other technology has done before. This book looks beyond these clichés and explores all aspects of this transformation at a deep level. It spells out a vision for the future and answers many questions that are routinely ignored.

...

IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data
IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data

Implement an Effective Security Metrics Project or Program

IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the...

Six Modern Plagues and How We Are Causing Them
Six Modern Plagues and How We Are Causing Them

"In a clear, engaging style, Dr. Walters tells the tale of each disease like a detective story. He allows each mystery to unfold as it did in reality, often slowly, through the lives of the plants and animals involved, the first human victims, the government officials who tried to respond, and the scientists who ultimately explained what...

Finance for Academics: A Guide to Investment for Income (SpringerBriefs in Finance)
Finance for Academics: A Guide to Investment for Income (SpringerBriefs in Finance)

The purpose of this book is to provide a hands-on guide to finance and investment for academics with an objective of providing strategies to maximize income, minimize fees, and legally minimize taxes. There are many risks in finance and investment such as stock market crashes, inflation, corruption, fees and interest rates. This book stresses...

Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
The Poison Paradox: Chemicals As Friends and Foes
The Poison Paradox: Chemicals As Friends and Foes
To appreciate the dangers and the risks from chemicals of all kinds it is necessary to understand how, when and why they are toxic. This falls within the field of toxicology and is what this book is all about.

I was encouraged to write the book by Dr John Emsley, who is well known for his popular science books on
...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy