33 livres(s)
Télécharger le livre :  Managing Online Risk
Ajouter à ma liste d'envies

Managing Online Risk


Deborah Gonzalez


In recent years, building a corporate online presence has become nonnegotiable for businesses, as consumers expect to connect with them in as many ways as possible. There are benefits to companies that use online technology, but there are risks as well. Managing Online...

Parution : 2014-09-25
Format(s) : PDF, epub sans DRM
J'achète
33,71
Télécharger le livre :  The Basics of Information Security
Ajouter à ma liste d'envies

The Basics of Information Security


Jason Andress


As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...

Parution : 2014-05-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  Carry On
Ajouter à ma liste d'envies

Carry On


Bruce Schneier


Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Parution : 2013-11-20
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,11
Télécharger le livre :  The Wireshark Field Guide
Ajouter à ma liste d'envies

The Wireshark Field Guide


Robert Shimonski


The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that...

Parution : 2013-05-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  Malware Forensics Field Guide for Windows Systems
Ajouter à ma liste d'envies

Malware Forensics Field Guide for Windows Systems


James M. Aquilina , Eoghan Casey , Cameron H. Malin


Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...

Parution : 2012-05-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies

Secrets and Lies


Bruce Schneier


Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Parution : 2011-03-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,43
Ajouter à ma liste d'envies

Schneier on Security


Bruce Schneier


Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...

Parution : 2009-03-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
28,80
Télécharger le livre :  Google Talking
Ajouter à ma liste d'envies

Google Talking


Joshua Brashars , Johnny Long


Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million...

Parution : 2006-12-13
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  How to Cheat at Configuring ISA Server 2004
Ajouter à ma liste d'envies

How to Cheat at Configuring ISA Server 2004


Debra Littlejohn Shinder , Thomas W Shinder


How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...

Parution : 2006-03-16
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Ajouter à ma liste d'envies

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft


Eric Cole , Sandra Ring


The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Parution : 2005-12-15
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Skype Me! From Single User to Small Enterprise and Beyond
Ajouter à ma liste d'envies

Skype Me! From Single User to Small Enterprise and Beyond


Markus Daehne


This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Parution : 2005-12-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Spies Among Us
Ajouter à ma liste d'envies

Spies Among Us


Ira Winkler


Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Parution : 2005-04-01
Format(s) : PDF
Éditeur : Wiley
J'achète
25,32
Télécharger le livre :  Biometrics
Ajouter à ma liste d'envies

Biometrics


Samir Nanavati , Raj Nanavati , Michael Thieme


An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...

Parution : 2002-04-29
Format(s) : PDF
Éditeur : Wiley
J'achète
40,62
<< < 12

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés