 |
|
 GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... |  |  |  |  Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... |
|
 Fuzzy Logic with Engineering Applications
Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.
This 15-chapter textbook remains the only major text that can be used for both undergraduate... |  |  Security in Wireless Ad Hoc and Sensor NetworksThis book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and... |  |  Design on the Edge: The Making of a High-Performance BuildingThis is the story of a small building in Ohio that was one of the first, if not the first, substantially green or high-performance buildings on a college campus. It spans the decade between 1995 and 2005. In that time, Americans impeached a president, balanced the federal budget and then unbalanced it again, witnessed the largest corporate... |
|
 The IDA Pro Book: The Unofficial Guide to the World's Most Popular DisassemblerNo source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into... |  |  |  |  Cracking Drupal: A Drop in the BucketThe first book to reveal the vulnerabilities and security issues that exist in the sites that have been built with Drupaland how to prevent them from continuing Drupal is an open source framework and content management system that allows users to create and organize content, customize presentation, automate tasks, and manage site visitors and... |
|
 Security for Telecommunications Networks (Advances in Information Security)Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them. Given the significant focus on securing critical infrastructure in recent years,... |  |  |  |  Corporate Resiliency: Managing the Growing Risk of Fraud and CorruptionCorporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |