|
|
|
|
|
SQL Server Security Distilled, Second EditionSQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern for all businesses. Securing SQL Server is one of the most important responsibilities of the SQL Server professional.
SQL Server Distilled, Second Edition is a very carefully researched, clearly explained book... | | Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... | | Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |
|
| | Web Security Basics (Networking)In our business world, Web sites have become a powerful marketplace that can capsize a company when attacked by a virus or hacker. Server security is critical to the survival of e-business. While the Internet has improved the way business is conducted, it has also added new rules to play by. With this book, you can take the necessary steps today... | | Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard... |
|
Peptide-Based Cancer Vaccines (Medical Intelligence Unit)
The field of peptide based cancer vaccines has evolved tremendously in the last decade of this century. The exploration on how to apply the peptide knowledge for vaccination purposes began when it was demonstrated that these peptides after being mixed into adjuvants actually induced T cell responses that could prevent virus infections and... | | Enterprise Security: The Manager's Defense GuideE-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's... | | Defeating the Hacker: A non-technical guide to computer securityThis is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |