Télécharger le livre :  Network Performance and Security
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Editeur : Syngress
Parution : 2016-03-10
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Big Data Concepts, Theories, and Applications
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice.  It also focuses on...

Editeur : Springer
Parution : 2016-03-03
PDF, ePub

158,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Radio-Frequency Human Exposure Assessment
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...

Editeur : Wiley-ISTE
Parution : 2016-03-03
PDF, ePub

163,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Diffusion Models for Modern Complex Networks
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable...

Editeur : Morgan Kaufmann
Parution : 2016-02-02
PDF, epub sans DRM

90,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Information Systems Security Officer's Guide
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents...

Editeur : Butterworth-Heinemann
Parution : 2016-01-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Deploying Secure Containers for Training and Development
In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Editeur : Syngress
Parution : 2015-12-10
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Essential Skills for Hackers
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Editeur : Syngress
Parution : 2015-12-09
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide
CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Editeur : Syngress
Parution : 2015-12-08
PDF

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Editeur : Syngress
Parution : 2015-12-08
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Editeur : Syngress
Parution : 2015-12-07
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Editeur : Syngress
Parution : 2015-12-07
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Breaking into Information Security
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...

Editeur : Syngress
Parution : 2015-12-05
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Operating System Forensics
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Editeur : Syngress
Parution : 2015-11-10
epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Study of Black Hole Attack Solutions
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Editeur : Syngress
Parution : 2015-11-03
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  ISSE 2015
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:·         Encrypted Communication·         Trust Services, eID...

Editeur : Springer Vieweg
Parution : 2015-11-02
PDF

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Traffic Anomaly Detection
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies...

Editeur : Iste Press - Elsevier
Parution : 2015-10-31
PDF, epub sans DRM

61,14

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Physical and Data-Link Security Techniques for Future Communication Systems
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...

Editeur : Springer
Parution : 2015-09-24
PDF, ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
<< < 1112131415 >