Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy
Clinton and Japan: The Impact of Revisionism on U.S. Trade Policy

This book chronicles how a controversial set of policy assumptions about the Japanese economy, known as revisionism, rose to become the basis of the trade policy approach of the Clinton administration. In the context of growing fear over Japan's increasing economic strength, revisionists argued that Japan represented a distinctive form of...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)

Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...

Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)
Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)

This collection provides new insights into the ’Age of Revolutions’, focussing on state trials for treason and sedition, and expands the sophisticated discussion that has marked the historiography of that period by examining political trials in Britain and the north Atlantic world from the 1790s and into the...

Ecosystem Responses to Mercury Contamination: Indicators of Change
Ecosystem Responses to Mercury Contamination: Indicators of Change

As rising levels of mercury in the environment pose an increasing threat of toxicity to humans and wildlife, several laws already call for industries to reduce mercury emissions at the source. Ecosystem Responses to Mercury Contamination: Indicators of Change outlines the infrastructure and methods needed to measure, monitor, and regulate the...

Fighting Computer Crime: A New Framework for Protecting Information
Fighting Computer Crime: A New Framework for Protecting Information

Who are the cybercriminals and what can we do to stop them? From the #1 cybercrime expert, a revolutionary new approach to . Fighting Computer Crime A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during...

Enhancing Microsoft Content Management Server with ASP.NET 2.0
Enhancing Microsoft Content Management Server with ASP.NET 2.0
The release of Microsoft Content Management Server (MCMS) Service Pack 2 opens up the world of ASP.NET 2.0 to MCMS developers. Written by the masters of MCMS, this book shows you how to use the new features of ASP.NET 2.0 that everyone is talking about in your MCMS development. You will first learn how to install and configure MCMS SP2. There are...
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

Securing Biometrics Applications
Securing Biometrics Applications
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial sectors. The increased threat to national security by terrorists has led to the explosive popularity of biometrics. A number of biometric devices are now available to capture biometric measurements such as fingerprints, palm,...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy