Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Impact Cratering: Processes and Products
Impact Cratering: Processes and Products

Impact cratering is arguably the most ubiquitous geological process in the Solar System. It has played an important role in Earth’s history, shaping the geological landscape, affecting the evolution of life, and generating economic resources. However, it was only in the latter half of the 20th century that the importance of impact...

Information Protection Playbook (Risk Management Portfolio)
Information Protection Playbook (Risk Management Portfolio)

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business...

Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities
Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities

In Future Cities, three authors - futurists, urban experts and systems architects - consider how the demands of the 21st Century will reshape the places where half of the world's population lives. From the history of urban development to the challenges of climate change and terrorism, they show how technology advances have shaped cities...

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Piracy at Sea (WMU Studies in Maritime Affairs)
Piracy at Sea (WMU Studies in Maritime Affairs)

​Over more than three decades starting in the 1990s, thousands of robberies, acts of piracy, and other violent attacks against merchant vessels have been reported in many of the world’s waters. The grave danger of piracy poses a direct threat not only to the security and efficiency of marine transportation, but more seriously, to...

Governing Immigration Through Crime: A Reader
Governing Immigration Through Crime: A Reader
In the United States, immigration is generally seen as a law and order issue. Amidst increasing anti-immigrant sentiment, unauthorized migrants have been cast as lawbreakers. Governing Immigration Through Crime offers a comprehensive and accessible introduction to the use of crime and punishment to manage undocumented immigrants....
Security Information and Event Management (SIEM) Implementation (Network Pro Library)
Security Information and Event Management (SIEM) Implementation (Network Pro Library)

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify,...

Bacterial Resistance to Antimicrobials
Bacterial Resistance to Antimicrobials

Focuses on combating bacterial pathogens by understanding their strategies of defense!

Each chapter begins with a summary of concepts, so those not actively working in the field gain an overall picture of what follows!

Highlights antibiotic resistance in pathogens that poses the greatest threat to human
...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Cardiovascular Regeneration Therapies Using Tissue Engineering Approaches
Cardiovascular Regeneration Therapies Using Tissue Engineering Approaches

The cardiovascular system transports oxygen and nutrients to all parts of the body; therefore, any impediment to this system through, for example, a circulatory disorder, represents a serious threat to organs, tissues, and cells. Obstructive diseases of vessels with a diameter of more than 1 mm can be treated by conventional surgical and...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy