Télécharger le livre :  Integrated Security Systems Design
Integrated Security Systems Design, 2nd Edition, is recognized as the industry-leading book on the subject of security systems design. It explains how to design a fully integrated security system that ties together numerous subsystems into one complete, highly...

Editeur : Butterworth-Heinemann
Parution : 2014-09-10
PDF, epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Governance and Security
Information Governance and Security shows managers in any size organization how to create and implement the policies, procedures and training necessary to keep their organization's most important asset—its proprietary information—safe from cyber and physical...

Editeur : Butterworth-Heinemann
Parution : 2014-09-09
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...

Editeur : Syngress
Parution : 2014-09-02
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Hiding in Speech Signals for Secure Communication
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...

Editeur : Syngress
Parution : 2014-08-27
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Online Security for the Business Traveler
Whether attending conferences, visiting clients, or going to sales meetings, travel is an unavoidable necessity for many businesspeople. Today's high-tech enabled businessperson travels with electronic devices such as smartphones, tablets, laptops, health sensors, and...

Editeur : Butterworth-Heinemann
Parution : 2014-08-23
PDF, epub sans DRM

14,72

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Measuring and Managing Information Risk
Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...

Editeur : Butterworth-Heinemann
Parution : 2014-08-23
PDF, epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Performance Analysis Field Guide
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Editeur : Syngress
Parution : 2014-08-14
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...

Editeur : Syngress
Parution : 2014-08-12
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Socio-technical Design of Ubiquitous Computing Systems
By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis.Designing such...

Editeur : Springer
Parution : 2014-07-28
ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Editeur : Syngress
Parution : 2014-07-16
PDF, epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Future Business Software
?What will business software look like in the future? And how will it be developed?This book covers the proceedings of the first international conference on Future Business Software – a new think tank discussing the trends in enterprise software with speakers from...

Editeur : Springer
Parution : 2014-07-08
Collection : Progress in IS ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Continued Rise of the Cloud
This book captures the state of the art in cloud technologies, infrastructures, and service delivery and deployment models. The work provides guidance and case studies on the development of cloud-based services and infrastructures from an international selection of...

Editeur : Springer
Parution : 2014-07-07
Collection : Computer Communications and Networks ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Risk Manager
Please note this is a Short Discount publication. A comprehensive guide to EDP contingency planning and disaster recovery. Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the...

Editeur : Elsevier Science
Parution : 2014-06-28
PDF sans DRM

263,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Confidential Information Sources
This edition includes the effects of massive computerization on the collection, storage, and reporting of personal data. For investigations and back-ground checks of any type, this outstanding volume tells how to hire reliable employees, sell to solvent customers, and...

Editeur : Butterworth-Heinemann
Parution : 2014-06-28
PDF sans DRM

57,97

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Coordinating User Interfaces for Consistency
In the years since Jakob Nielsen's classic collection on interface consistency first appeared, much has changed, and much has stayed the same. On the one hand, there's been exponential growth in the opportunities for following or disregarding the principles of interface...

Editeur : Morgan Kaufmann
Parution : 2014-06-28
PDF sans DRM

70,63

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Leader Insights for Information Protection
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader...

Editeur : Elsevier
Parution : 2014-05-24
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...

Editeur : Syngress
Parution : 2014-05-20
epub sans DRM

29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computers, Business, and Security
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the...

Editeur : Butterworth-Heinemann
Parution : 2014-05-20
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Security
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and...

Editeur : Butterworth-Heinemann
Parution : 2014-05-20
PDF sans DRM

57,97

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Breakdowns in Computer Security
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short...

Editeur : Elsevier
Parution : 2014-05-16
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
<< < 1415161718 >