| |
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly...
Editeur :
Butterworth-Heinemann
Parution :
2014-09-10
PDF, epub sans DRM
|
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset—its proprietary information—safe from cyber and physical...
Editeur :
Butterworth-Heinemann
Parution :
2014-09-09
PDF, epub sans DRM
|
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...
Editeur :
Syngress
Parution :
2014-09-02
PDF, epub sans DRM
|
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...
Editeur :
Syngress
Parution :
2014-08-27
PDF, epub sans DRM
|
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and...
Editeur :
Butterworth-Heinemann
Parution :
2014-08-23
PDF, epub sans DRM
|
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...
Editeur :
Butterworth-Heinemann
Parution :
2014-08-23
PDF, epub sans DRM
|
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...
Editeur :
Syngress
Parution :
2014-08-14
epub sans DRM
|
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...
Editeur :
Syngress
Parution :
2014-08-12
PDF, epub sans DRM
|
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...
Editeur :
Springer
Parution :
2014-07-28
ePub
|
Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...
Editeur :
Syngress
Parution :
2014-07-16
PDF, epub sans DRM
|
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...
Editeur :
Springer
Parution :
2014-07-08
Collection :
Progress in IS
ePub
|
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...
Editeur :
Springer
Parution :
2014-07-07
Collection :
Computer Communications and Networks
ePub
|
Please note this is a Short Discount publication. A comprehensive guide to EDP contingency planning and disaster recovery. Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the...
Editeur :
Elsevier Science
Parution :
2014-06-28
PDF sans DRM
|
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and...
Editeur :
Butterworth-Heinemann
Parution :
2014-06-28
PDF sans DRM
|
In the years since Jakob Nielsen's classic collection on interface consistency first appeared, much has changed, and much has stayed the same. On the one hand, there's been exponential growth in the opportunities for following or disregarding the principles of interface...
Editeur :
Morgan Kaufmann
Parution :
2014-06-28
PDF sans DRM
|
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader...
Editeur :
Elsevier
Parution :
2014-05-24
epub sans DRM
|
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...
Editeur :
Syngress
Parution :
2014-05-20
epub sans DRM
|
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the...
Editeur :
Butterworth-Heinemann
Parution :
2014-05-20
PDF sans DRM
|
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and...
Editeur :
Butterworth-Heinemann
Parution :
2014-05-20
PDF sans DRM
|
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short...
Editeur :
Elsevier
Parution :
2014-05-16
PDF sans DRM
|