Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Governing Immigration Through Crime: A Reader
Governing Immigration Through Crime: A Reader
In the United States, immigration is generally seen as a law and order issue. Amidst increasing anti-immigrant sentiment, unauthorized migrants have been cast as lawbreakers. Governing Immigration Through Crime offers a comprehensive and accessible introduction to the use of crime and punishment to manage undocumented immigrants....
Piracy at Sea (WMU Studies in Maritime Affairs)
Piracy at Sea (WMU Studies in Maritime Affairs)

​Over more than three decades starting in the 1990s, thousands of robberies, acts of piracy, and other violent attacks against merchant vessels have been reported in many of the world’s waters. The grave danger of piracy poses a direct threat not only to the security and efficiency of marine transportation, but more seriously, to...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Since the pioneering discovery by Felgner et al. (1987) that cationic lipid can efficiently transfect cells, there was a surge of research activity in this area. The field received another boost when Nabel et al. (1993) successfully completed a small phase I clinical trial in gene therapy of melanoma using cationic liposome as a...
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
Managing Business Risk: A Practical Guide to Protecting Your Business
Managing Business Risk: A Practical Guide to Protecting Your Business
The balance between risk and reward is the very essence of business: you have to take risks in order to generate returns and, generally speaking, higher returns involve greater risks. However, there is a difference between risks taken as a result of careful judgement and those taken unwittingly.

In a world of
...
Impact Cratering: Processes and Products
Impact Cratering: Processes and Products

Impact cratering is arguably the most ubiquitous geological process in the Solar System. It has played an important role in Earth’s history, shaping the geological landscape, affecting the evolution of life, and generating economic resources. However, it was only in the latter half of the 20th century that the importance of impact...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy