Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy
Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy

Host Your Web Site On The Cloud is the OFFICIAL step-by-step guide to this revolutionary approach to hosting and managing your websites and applications, authored by Amazon's very own Jeffrey Barr.

"Host Your Web Site in the Cloud" shows you just how easy it is to host your website in the cloud with...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2018, Volume 1 (Lecture Notes in Networks and Systems (55))

The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5–6 May 2018. Introducing the innovative works of scientists, professors, research scholars, students...

Voice over IP Fundamentals (2nd Edition)
Voice over IP Fundamentals (2nd Edition)

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter,
...

C# COM+ Programming
C# COM+ Programming
A must have reference for developers already working with COM+ who are ready to transition the the .NET Platform. Softcover. CD-ROM included.

C# COM+ Programming
Your Complete Guide to COM+ Services in the .NET Framework Whether you want to integrate existing COM+ services into
...
Internetworking Troubleshooting Handbook (2nd Edition)
Internetworking Troubleshooting Handbook (2nd Edition)
If you can think of the problem, Internetworking Troubleshooting Handbook probably has the solution--at least when it comes to networking problems. This 714-page tome is absolutely phenomenal in scope. Though you may not find in-depth scholarly discussions of networking woes, you will find pragmatic tips that can help you through an...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
High Performance Switches and Routers
High Performance Switches and Routers

Learn to Design High Performance Switches and Routers for Today's Ever Growing Internet Traffic

As Internet traffic continues to grow, and demands for quality of service become more stringent, researchers and engineers can turn to High Performance Switches and Routers for tested and proven solutions. This...

Voice Over IP Crash Course
Voice Over IP Crash Course
Recent advances in VoIP (Voice over IP) technology have made it the solution of choice for voice service because of its low cost and increased reliability. Voice Over IP Crash Course offers practical technology coverage, while discussing the business, strategic and competitive implications of VoIP deployment in corporations. The book also...
unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy