Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing the Human Factor in Information Security: How to win over staff and influence business managers
Managing the Human Factor in Information Security: How to win over staff and influence business managers
"...an engaging read." (Information Age, May 2009) "I found the book enjoyable and easy to read. It is very informative, and gives good references" (Infosecurity, June 2009)

With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all
...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Cholera: The Biography (Biographies of Diseases)
Cholera: The Biography (Biographies of Diseases)

Cholera is a frightening disease. Victims are wracked by stomach cramps and suffer intense diarrhoea. Death can come within hours.

Though now seeming a distant memory in Europe, which suffered several epidemics in the 19th century before John Snow identified the link with water, cholera is still a serious threat in many parts
...

Cyber Security Essentials
Cyber Security Essentials

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and...

Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Nanoscale Devices - Fundamentals and Applications (NATO Science Series II: Mathematics, Physics and Chemistry)
Over the last decade the interest in nanoscale materials and their applications in novel electronic devices have been increasing tremendously. This is caused by the unique properties of nanoscale materials and the outstanding performance of nanoscale devices. The fascinating and often unrivalled properties of nanoscale materials and devices opened...
Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)
Before Auschwitz: Irène Némirovsky and the Cultural Landscape of Inter-war France (Routledge Studies in Twentieth-Century Literature)

This book analyses Irene Némirovsky’s literary production in its relationship to the literary and cultural context of the inter-war period in France. It examines topics of central importance to our understanding of the literary field in France in the period, such as: the close relationship between politics and literature; the...

Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

Online Algorithms: The State of the Art (Lecture Notes in Computer Science)
Online Algorithms: The State of the Art (Lecture Notes in Computer Science)
When Hannibal crossed the Alps into Italy, it was no longer as simple to respond to a Roman naval threat in Spain as it was before crossing the Alps. Had Hannibal known the entire future Roman strategy before crossing the Alps then (assuming appropriate computational ability) he could have computed an optimal strategy to deal with the Rome/Cartago...
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling
Deep in the Shadows: Undercover in the Ruthless World of Human Smuggling

"You have a lot of enemies, Hipolito. I heard rumors in jail that some of the people you busted are going to try to kill you, so you better watch yourself." U.S. Special Agent Hipolito Acosta had put lots of thugs in jail, but the death threat from an imprisoned convict was still a shock.


Acosta recounts
...

Hacking a Terror Network: The Silent Threat of Covert Channels
Hacking a Terror Network: The Silent Threat of Covert Channels
From a counterterrorism perspective, discovering terrorist communication networks
and methods is extremely important.Terrorists have demonstrated the
capability to exchange messages that vary from archaic (using human couriers)
to technologically advanced using “virtual dead-drops.”The popular press is full
of
...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy