Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

Threat Modeling: Designing for Security
Threat Modeling: Designing for Security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he
...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization
Contagion and Chaos: Disease, Ecology, and National Security in the Era of Globalization
Historians from Thucydides to William McNeill have pointed to the connections between disease and civil society. Political scientists have investigated the relationship of public health to governance, introducing the concept of health security. In Contagion and Chaos, Andrew Price-Smith offers the most comprehensive examination yet of...
Deploying Microsoft Forefront Threat Management Gateway 2010
Deploying Microsoft Forefront Threat Management Gateway 2010

When we began this project, our intent was to create a real world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Threat Management Gateway (TMG) 2010. We hope you find that we have achieved that goal. We’ve also included the main deployment scenarios for Forefront TMG,...

Wireless Foresight : Scenarios of the Mobile World in 2015
Wireless Foresight : Scenarios of the Mobile World in 2015

Written for those in the telecom, datacom and infocom industries, this provocative text deals with the development of the wireless communications industry and technology during the coming ten to fifteen years.


Wireless Foresight deals with the development of the wireless communications industry and technology...

Principles and Practices of Interconnection Networks (The Morgan Kaufmann Series in Computer Architecture and Design)
Principles and Practices of Interconnection Networks (The Morgan Kaufmann Series in Computer Architecture and Design)
"Prof. Dally's pioneering research dramatically and permanently changed this field by introducing rigorous evaluation techniques and creative solutions to the challenge of high-performance computer system communication. This book will instantly become a canonical reference in the field of interconnection networks."
-Craig Stunkel,
...
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
Paradiplomacy in Action: The Foreign Relations of Subnational Governments (Routledge Series in Federal Studies)
The international activities of regions have attracted considerable political and scholarly attention in recent years. This has perhaps been most notable in Europe, where the protagonism of regions within the EU and the alliances among regions have generated a substantial literature, but the phenomenon has also marked federal...
Identity Theft For Dummies
Identity Theft For Dummies

Practical solutions to help you deter, detect, and defend against identity theft In 2008, 9.9 million Americans became victims of identity theft. The cost exceeded $48 billion in 2008; consumers spend some $5 billion out-of-pocket each year to clear up resulting fraud issues. This guide will help keep you from becoming the next victim....

The Osteoporosis Manual: Prevention, Diagnosis and Management
The Osteoporosis Manual: Prevention, Diagnosis and Management

This comprehensive manual covers all aspects of the prevention, diagnosis and management of osteoporosis, offering an upbeat and optimistic assessment of what can be achieved. While scientifically based, the book provides easy-to-follow guidelines for lifelong maintenance of skeletal structure and function. It deals with everything...

Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Sustainable Technology Development
Sustainable Technology Development

In the time it takes to read this sentence, about fifteen people will be added to the world's population.  Read the sentence again, and there will be thirty. Tomorrow, each of these people will be demanding greater prosperity. Production and consumption are increasing fast but will have to grow even faster in the future to keep up...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy