A new edition of Shon Harris’ bestselling exam prep guideーfully updated for the new CISSP 2018 Common Body of Knowledge
This effective self-study guide fully prepares you for the challenging CISSP ……続きを見る
A high-level overview of networking, data science and computer security. Designed for readers who don't care for academic formalities, it's a fast and easy guide. It teaches the foundations programm……続きを見る
Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards……続きを見る
A comprehensive guide to securing your Linux system against cyberattacks and intrudersKey FeaturesDeliver a system that reduces the risk of being hackedExplore a variety of advanced Linux security t……続きを見る
A Breakthrough Plan For Free Web Hosting, How To Find A Dedicated Server, Safe Servers, Types of Web Hosting, Windows Dedicated Server and Budgeting For Dedicated Servers 続きを見る
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the sy……続きを見る
Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administratorsーinclud……続きを見る
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity ……続きを見る
CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification. The book is organized into six pa……続きを見る
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s ……続きを見る
The Ultimate Tool for MINDSTORMS® Maniacs
The new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics inf……続きを見る
Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard-a continuous maintenance program-this guide is aimed at IT managers of small and medium businesse……続きを見る
Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the followi……続きを見る
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication……続きを見る
著者:Valerie Maddock
出版社: IT Governance Publishing
発売日: 2014年10月19日
If you want to tackle the problem of information security, you cannot rely on the help of technology alone. Information security breaches tend to occur as a result of human, as well as technological……続きを見る
DSL und drahtlose Netzwerkverbindungen einzurichten, ist keine Hexerei! Egal ob Sie einfach den Kabelsalat satthaben oder mit der ganzen Familie gemeinsam das Internet entdecken wollen - in wenigen ……続きを見る
DSL, WLAN, Telefon: Die FRITZ!Box bringt Sie sicher und schnell ins Internet - zumindest wenn alles richtig eingestellt und abgesichert ist. Dieses Buch zeigt, wie Sie Ihre FRITZ!Box für optimale Le……続きを見る
Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides……続きを見る
About This Book
Enable a full cost-effective unified communications server solution
Go from a single server configuration to a multi-site deployment
Implement the Call Center module and take advant……続きを見る
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling compl……続きを見る
Our internet exposure is raising every day, with that online scammers are taking advantage of our lack of protection.
Want to know what is Identity theft and which simple steps you can take to avoid……続きを見る
Diplomarbeit aus dem Jahr 2010 im Fachbereich Informatik - IT-Security, Note: 1,00, Fachhochschule St. Pölten (Netzwerktechnik/Netzwerksicherheit), Sprache: Deutsch, Abstract: Das kontinuierliche An……続きを見る
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks
Take a cooperative approach towards addressing the technology’s……続きを見る
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching th……続きを見る
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than……続きを見る
Passwords are not the problem.
The management of passwords is the real security nightmare.
User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to gen……続きを見る
Studienarbeit aus dem Jahr 2009 im Fachbereich Informatik - IT-Security, Note: 1,3, Hochschule Karlsruhe - Technik und Wirtschaft, Veranstaltung: Dataminig für die IT Sicherheit, Sprache: Deutsch, A……続きを見る
How many emails have you deleted recently offering you inherited millions from a mystery relative, or the uncollected winnings from an unheard of lottery? Rather than press delete, Don Mullan decide……続きを見る
Discover why routers in the Juniper MX Seriesーwith their advanced feature sets and record-breaking scaleーare so popular among enterprises and network service providers. This revised and expanded e……続きを見る
Dieses Buch ist ein Praxisleitfaden zum Thema Informationssicherheits-Management und gleichzeitig Begleitbuch für die Prüfungsvorbereitung zum "Certified Information Security Manager (CISM)" nach IS……続きを見る