Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Counterfeit Integrated Circuits: Detection and Avoidance
Counterfeit Integrated Circuits: Detection and Avoidance

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade.  The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs).  Not only does this book provide...

Rethinking Urban Parks: Public Space and Cultural Diversity
Rethinking Urban Parks: Public Space and Cultural Diversity
William H. Whyte set out to discover why some New York City public spaces were successes, fi lled with people and activities, while others were empty, cold, and unused. After seven years of fi lming small parks and plazas in the city, he found that only a few plazas in New York City were attracting daily users and saw this decline as a threat to...
Medical Response to Terrorism: Preparedness and Clinical Practice
Medical Response to Terrorism: Preparedness and Clinical Practice
Even two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security,...
Impact Cratering: Processes and Products
Impact Cratering: Processes and Products

Impact cratering is arguably the most ubiquitous geological process in the Solar System. It has played an important role in Earth’s history, shaping the geological landscape, affecting the evolution of life, and generating economic resources. However, it was only in the latter half of the 20th century that the importance of impact...

Going Stealth: Transgender Politics and U.S. Surveillance Practices
Going Stealth: Transgender Politics and U.S. Surveillance Practices
In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a...
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)
CIW: Security Professional Study Guide Exam 1D0-470 (With CD-ROM)

Here’s the book you need to prepare for Exam 1D0-470, CIW Security Professional. This Study Guide provides:

  • In-depth coverage of official exam objectives
  • Practical information on security concepts and practices
  • Hundreds of...
A Practical Guide to Security Engineering and Information Assurance
A Practical Guide to Security Engineering and Information Assurance

A Practical Guide to Security Engineering and Information Assurance provides insight into the broader realm of information assurance (IA). It explains real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system....

Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)
Improving Energy Efficiency in Industrial Energy Systems: An Interdisciplinary Perspective on Barriers, Energy Audits, Energy Management, Policies, and Programs (Green Energy and Technology)

Industrial energy efficiency is one of the most important means of reducing the threat of increased global warming. Research however states that despite the existence of numerous technical energy efficiency measures, its deployment is hindered by the existence of various barriers to energy efficiency. The complexity of increasing energy...

Collaborative Computer Security and Trust Management (Premier Reference Source)
Collaborative Computer Security and Trust Management (Premier Reference Source)

Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the...

unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy