Télécharger le livre :  Emerging Trends in ICT Security
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge...

Editeur : Morgan Kaufmann
Parution : 2013-11-06
epub sans DRM

103,34

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Social Media Security
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...

Editeur : Syngress
Parution : 2013-11-01
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of IT Audit
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the...

Editeur : Syngress
Parution : 2013-10-31
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybersecurity
A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as...

Editeur : Wiley
Parution : 2013-10-18
PDF, ePub

54,12

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Unified Communications Forensics
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by...

Editeur : Syngress
Parution : 2013-10-07
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Warfare
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information...

Editeur : Syngress
Parution : 2013-10-01
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent years due to the broadcast nature of the wireless medium and its...

Editeur : Springer
Parution : 2013-09-30
Collection : SpringerBriefs in Electrical and Computer Engineering ePub

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Job Reconnaissance
There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new...

Editeur : Syngress
Parution : 2013-09-20
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Protection Playbook
The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the...

Editeur : Elsevier
Parution : 2013-09-17
epub sans DRM

64,30

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Cloud Computing
As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use...

Editeur : Syngress
Parution : 2013-09-03
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics Processing and Procedures
This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody.This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written...

Editeur : Syngress
Parution : 2013-08-30
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network and System Security
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and...

Editeur : Syngress
Parution : 2013-08-26
epub sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security and IT Infrastructure Protection
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...

Editeur : Syngress
Parution : 2013-08-22
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Credible Checklists and Quality Questionnaires
Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method. In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking...

Editeur : Morgan Kaufmann
Parution : 2013-08-22
epub sans DRM

17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Editeur : Syngress
Parution : 2013-08-21
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  FISMA Compliance Handbook
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of...

Editeur : Syngress
Parution : 2013-08-20
epub sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  X-Ways Forensics Practitioner's Guide
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners...

Editeur : Syngress
Parution : 2013-08-10
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Anonymity
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...

Editeur : Syngress
Parution : 2013-07-19
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Patterns
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...

Editeur : Wiley
Parution : 2013-07-12
Collection : Wiley Software Patterns Series ePub

47,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Risk Management Framework
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be...

Editeur : Syngress
Parution : 2013-07-03
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
<< < 1617181920 >