|
|
|
|
|
|
Snort 2.0 Intrusion Detection“Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that ominous announcement emanating from a robot as it twisted and turned with arms thrashing and head spinning, we sat galvanized to our televisions waiting for the intruder to reveal itself.Would this be the end of Will Robinson, as we knew him? ... | | Introduction to Fuzzy Logic using MATLABThe world we live in is becoming ever more reliant on the use of electronics and computers to control the behavior of real-world resources. For example, an increasing amount of commerce is performed without a single banknote or coin ever being exchanged. Similarly, airports can safely land and send off airplanes without ever looking out of a... | | |
|
Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This... | | IBM DB2 9 New FeaturesGet up to speed quickly on the new features in IBM DB2 9
In this book, the IBM expert authors provide you with comprehensive technical details and real-world business uses for all of the exciting new features in the current release of DB2 9. You’ll learn about the capabilities found in pureXML as well as administrative enhancements... | | Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |