 |
|
 IPv6 Security
Internet Protocol version 6 (IPv6) is the next version of the protocol that is used for communications on
the Internet. IPv6 is a protocol that has been in existence for many years, but it has not yet replaced
IPv4. IPv4 has some limitations that were not anticipated when it was first created. Because IPv6 overcomes
many of these... |  |  Populations, Public Health, and the LawLaw plays a crucial role in protecting the health of populations. Whether the public health threat is bioterrorism, pandemic influenza, obesity, or lung cancer, law is an essential tool for addressing the problem. Yet for many decades, courts and lawyers have frequently overlooked law's critical importance to public health. "Populations,... |  |  Mac Security Bible
Your essential, no-holds-barred guide to Mac security threats and solutions
Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely guide, he not only takes you beyond the myths, he also delves into... |
|
|
 |  |  High-Level Data FusionMaster cutting-edge Level 2 fusion techniques that help you develop powerful situation assessment services with eye-popping capabilities and performance with this trail-blazing resource. The book explores object and situation fusion processes with an appropriate handling of uncertainties, and applies cutting-edge artificial intelligence and... |  |  The Zombie Survival Guide: Complete Protection from the Living DeadThe Zombie Survival Guide is your key to survival against the hordes of undead who may be stalking you right now. Fully illustrated and exhaustively comprehensive, this book covers everything you need to know, including how to understand zombie physiology and behavior, the most effective defense tactics and weaponry, ways to... |
|
 Vulnerability ManagementAs old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any... |  |  Terrorism's Unanswered Questions (Praeger Security International)Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,... |  |  Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the... |
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 |