Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

Six Modern Plagues and How We Are Causing Them
Six Modern Plagues and How We Are Causing Them

"In a clear, engaging style, Dr. Walters tells the tale of each disease like a detective story. He allows each mystery to unfold as it did in reality, often slowly, through the lives of the plants and animals involved, the first human victims, the government officials who tried to respond, and the scientists who ultimately explained what...

The Internet: The Missing Manual
The Internet: The Missing Manual

The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing?

This utterly current book...

Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Antiviral Drug Discovery for Emerging Diseases and Bioterrorism Threats
Promising drug discovery efforts in the race to cure emerging diseases and thwart bioterrorism

It was not too long ago that scientists believed that the discovery of powerful antimicrobial agents and vaccines would lead to the eradication of viral diseases. A warning, however, of the looming threat of viral diseases on U.S. national security...

Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations

“We are dropping cyber bombs. We have never done that before.”—U.S. Defense Department official

A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently:

A computer virus is unleashed that...

RNA Viruses: A Practical Approach
RNA Viruses: A Practical Approach

This book provides a broad treatment of the principles and practice of R.N.A. virus research to insure the widest possible audience. It is perfect for laboratories involved in virus culture, including both academic and industrial research groups and public health laboratories.

...
The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Computer Viruses and Malware (Advances in Information Security)
Computer Viruses and Malware (Advances in Information Security)

Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the...

Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
Information Security Applications: 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers
This book constitutes the refereed proceedings of the 7th International Workshop on Information Security Applications, WISA 2006, held in Jeju Island, Korea in August 2006.

The 30 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 146 submissions. The papers are organized in topical...

Return of the Black Death: The World's Greatest Serial Killer
Return of the Black Death: The World's Greatest Serial Killer

If the twenty-first century seems an unlikely stage for the return of a 14th-century killer, the authors of Return of the Black Death argue that the plague, which vanquished half of Europe, has only lain dormant, waiting to emerge again—perhaps, in another form. At the heart of their chilling scenario is their contention...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy