Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Attacks and Defenses: A Hands-on Approach
Network Attacks and Defenses: A Hands-on Approach

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Effective Complaint Management (Management for Professionals)
Effective Complaint Management (Management for Professionals)

This practice- and research-based book caters to the needs of executive managers who see customer satisfaction as their primary goal. The authors identify the need for an effective complaint management strategy that prevents the loss of dissatisfied customers. Dissatisfied customers are at risk of migrating; accordingly,...

Home Network Security Simplified
Home Network Security Simplified

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your needyour vulnerabilityis that much greater. Now, with Home Network Security...

Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
Nuclear Weapons: A Very Short Introduction
Nuclear Weapons: A Very Short Introduction
Despite not having been used in anger since Hiroshima and Nagasaki, nuclear weapons are still the biggest threat that faces us in the 21st century. Indeed, for all the effort to reduce nuclear stockpiles to zero and to keep other nations (such as Iran) from developing nuclear capability, it seems that the Bomb is here to stay. In this gripping Very...
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics And Modeling Of Tera- And Nano-Devices (Selected Topics in Eletronics and Systems)
Physics and Modeling of Tera- and Nano-Devices is a compilation of papers by well-respected researchers working in the field of physics and modeling of novel electronic and optoelectronic devices. The topics covered include devices based on carbon nanotubes, generation and detection of terahertz radiation in semiconductor structures including...
unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy