Home | Amazing | Today | Tags | Publishers | Years | Search 
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job
It's not a job. It's THE job, and here's how to get it.

What does your ideal IT security job look like? What will prospective employers expect you to know? What affects how they view you and your skills? What if you haven't had much experience? What if you're not 30 anymore?

Here's the crash course in how to...

IT Auditing: Using Controls to Protect Information Assets
IT Auditing: Using Controls to Protect Information Assets

Plan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and...

Ubuntu Linux Bible
Ubuntu Linux Bible
Everything you need to know—and then some!

It's the fastest-growing, coolest Linux distribution out there, and now you can join the excitement with this information-packed guide. Want to edit graphics? Create a spreadsheet? Manage groups? Set up an NFS server? You'll learn it all and more with the expert guidance,...

Map-based Mobile Services: Theories, Methods and Implementations
Map-based Mobile Services: Theories, Methods and Implementations

The book is divided into three parts: theory, method and implementation. Starting with a summary of the state-of-the-art in mobile technologies, the first part analyses their impacts on cartography and pinpoints the missing theories concerned with the development of map-based mobile services. A conceptual framework of mobile cartography is then...

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. Now you can prepare for the CEH certification exam 312-50 with the only review guide officially endorsed by EC-Council.

Covering all exam objectives, from ethics and testing to securing wired and wireless networks, this concise, focused...

Multi-Objective Optimization in Computer Networks Using Metaheuristics
Multi-Objective Optimization in Computer Networks Using Metaheuristics
Many new multicast applications emerging from the Internet, such as Voice-over-IP (VoIP), videoconference, TV over the Internet, radio over the Internet, video streaming multipoint, etc., have the following resource requirements: bandwidth consumption, end-to-end delay, delay jitter, packet loss ratio, and so forth. It is therefore necessary to...
Mastering Microsoft Windows Vista Home: Premium and Basic
Mastering Microsoft Windows Vista Home: Premium and Basic
In-depth Coverage of Windows Vista Home Premium—Including Coverage of Vista Home Basic

Configure, run, and troubleshoot Windows Vista Home Premium or Windows Vista Home Basic with the detailed coverage you'll find in this comprehensive guide. With a task-based approach and clear, no-nonsense instructions,...

Designing with Web Standards (2nd Edition)
Designing with Web Standards (2nd Edition)
Best-selling author, designer, and web standards evangelist Jeffrey Zeldman has updated his classic, industry-shaking guidebook. This new edition--now in full color--covers improvements in best practices and advances in the world of browsers since the first edition introduced the world to standards-based design. Written in the same engaging and...
Active and Programmable Networks for Adaptive Architectures and Services
Active and Programmable Networks for Adaptive Architectures and Services
New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,...
Perspectives on Multimedia: Communication, Media and Information Technology
Perspectives on Multimedia: Communication, Media and Information Technology
"...There is most likely something for everyone in this book…" (Computer Bulletin, January 2005)

The uses of multimedia are rapidly increasing. Its power to present information in ways not previously possible and its integration of resources, allow for the creation of rich learning environments. Perspectives on
...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy