 |
|
 Hacking: The Next Generation (Animal Guide)With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the... |  |  Mike Meyers' CompTIA Network+ Certification Passport, Third EditionWhat do you mean, you don’t have a passport? Why, it’s sitting right in your hands, even as you read! This book is your passport to a very special place.You’re about to begin a journey,my friend: a journey toward that magical place called certification! You don’t need a ticket, you don’t need a suitcase—just... |  |  The Mazzel Ritual: Culture, Customs and Crime in the Diamond TradeThe academic study of diamonds is as multi-faceted as the precious stones themselves. Mineralogists and geographers have written about them, as have historians and economists and students of art and fashion. They each shine their light on a different aspect of this source of luminous radiance. But who would venture to describe the entire... |
|
 Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  Cyber Terrorism: A Guide for Facility Managers
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers.This book will address cyberterrorism and... |  |  Groundwater in the Environment: An Introduction
This accessible new textbook provides a thorough introduction to all aspects of groundwater systems and their management. Using straightforward language and analogies to everyday experiences, it explains the origins, nature, and behavior of subsurface water without resorting to complicated mathematics.
Groundwater in the... |
|
 The Complete Book of Locks and Locksmithing (Complete Book of Locks & Locksmithing)
The knowledge, skill, and expertise of any true professional often can be gauged by the library of literature that he or she keeps and has read. In the often mysterious, secretive, and intriguing world of locks and locksmithing, no true professional, aficionado, or curiosity seeker would be without The Complete Book of Locks and Locksmithing,... |  |  BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |  |  |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |