Télécharger le livre :  Security for Small Computer Systems
Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the...

Editeur : Elsevier
Parution : 2014-05-16
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Targeted Cyber Attacks
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...

Editeur : Syngress
Parution : 2014-04-18
PDF, epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Collaboration with Cloud Computing
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...

Editeur : Syngress
Parution : 2014-04-07
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The UX Five-Second Rules
The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method.The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the...

Editeur : Morgan Kaufmann
Parution : 2014-03-21
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Forensic Analysis Toolkit
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...

Editeur : Syngress
Parution : 2014-03-11
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime and Cyber Warfare
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...

Editeur : Wiley-ISTE
Parution : 2014-02-19
PDF, ePub

163,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Threat Modeling
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...

Editeur : Wiley
Parution : 2014-02-12
PDF, ePub

59,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking Point of Sale
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...

Editeur : Wiley
Parution : 2014-02-03
PDF, ePub

54,12

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Unmasking the Social Engineer
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Editeur : Wiley
Parution : 2014-01-27
PDF, ePub

33,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data-Driven Security
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...

Editeur : Wiley
Parution : 2014-01-24
PDF, ePub

45,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Investigative Interviewing
The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative...

Editeur : Butterworth-Heinemann
Parution : 2013-12-27
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking with Kali
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...

Editeur : Syngress
Parution : 2013-12-05
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...

Editeur : Syngress
Parution : 2013-11-26
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Interview Techniques for UX Practitioners
Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality...

Editeur : Morgan Kaufmann
Parution : 2013-11-23
epub sans DRM

17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Carry On
Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160...

Editeur : Wiley
Parution : 2013-11-20
PDF, ePub

27,11

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Identity and Access Management
Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide...

Editeur : Syngress
Parution : 2013-11-19
ePub, PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cloud Storage Forensics
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in...

Editeur : Syngress
Parution : 2013-11-16
epub sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Information Security
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear...

Editeur : Syngress
Parution : 2013-11-12
epub sans DRM

45,35

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Investigating Internet Crimes
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...

Editeur : Syngress
Parution : 2013-11-12
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Incident Response and Forensics Team Management
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need...

Editeur : Syngress
Parution : 2013-11-08
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
<< < 1516171819 >