Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Catholic University of America Press is proud to present the second volume in its new Sayings of the Fathers of the Church Series. Featuring a wide range of scholars compiling material from our acclaimed Fathers of the Church volumes, each title will be devoted to a few specific areas of theology. The inaugural volume covered The...
Handbook of Biosurveillance
Handbook of Biosurveillance
Over the past five years, the very real threat posed by emerging infections and bioterrorism has challenged and revolutionized the practice of disease surveillance. Many cities and countries are constructing new disease surveillance systems. Even the basic concept of surveillance data has changed, expanding dramatically beyond notifiable disease...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
A Lighter Footprint: A Practical Guide to Minimising Your Impact on the Planet
A Lighter Footprint: A Practical Guide to Minimising Your Impact on the Planet
I believe that global warming is the biggest issue facing humanity today – it represents a far greater threat than terrorism, fundamentalism, or nuclear war. I am not alone in this belief. Scientists and many policymakers agree that the global population must reduce greenhouse gas emissions by at least 60 per cent...
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks,...

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks
An organizations employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider...
PC Magazine - 1 August 2008
PC Magazine - 1 August 2008
First Looks
ABBYY FineReader Professional 9.0
Adobe Dreamweaver CS4 beta
Alienware Area-51 m15x
ASUS EeePC 900
Cerise Quad-Core Workstation
Gateway DX442XP
HP Color LaserJet CM1312nfi MFP
Kodak EasyShare M1033
LaCie Little Big Disk Quadra
Lenovo ThinkCentre M57p eco
Lenovo ThinkVision L190x...
Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)
Ransomware Revolution: The Rise of a Prodigious Cyber Threat (Advances in Information Security, 85)

This book explores the genesis of ransomware and how the parallel emergence of encryption technologies has elevated ransomware to become the most prodigious cyber threat that enterprises are confronting. It also investigates the driving forces behind what has been dubbed the ‘ransomware revolution’ after a series of major...

Cisco Network Security Little Black Book
Cisco Network Security Little Black Book
With this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and...
Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy