Télécharger le livre :  Seven Deadliest USB Attacks
Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the...

Editeur : Syngress
Parution : 2010-06-03
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seven Deadliest Network Attacks
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and...

Editeur : Syngress
Parution : 2010-06-02
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seven Deadliest Social Network Attacks
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a...

Editeur : Syngress
Parution : 2010-06-02
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security in a Web 2.0+ World
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know...

Editeur : Wiley
Parution : 2010-04-27
PDF, ePub

37,98

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thoughts on Interaction Design
Thoughts on Interaction Design explores the theory behind the field of Interaction Design in a new way. It aims to provide a better definition of Interaction Design that encompasses the intellectual facets of the field and the particular methods used by practitioners in...

Editeur : Morgan Kaufmann
Parution : 2010-03-27
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Unauthorised Access
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT...

Editeur : Wiley
Parution : 2010-03-25
PDF, ePub

37,98

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy...

Editeur : Syngress
Parution : 2010-03-13
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Editeur : Syngress
Parution : 2010-03-03
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seven Deadliest Microsoft Attacks
Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up...

Editeur : Syngress
Parution : 2010-03-01
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network and System Security
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and...

Editeur : Syngress
Parution : 2010-02-27
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Seven Deadliest Web Application Attacks
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of...

Editeur : Syngress
Parution : 2010-02-20
epub sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance
PCI Compliance: Understand and Implement EffectivePCI Data Security Standard Compliance, Second Edition, discusses not only how to applyPCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security...

Editeur : Syngress
Parution : 2009-11-13
ePub, PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Eleventh Hour Linux+
Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.The book begins with a review of important concepts that are needed for successful operating system installation. These include computer...

Editeur : Syngress
Parution : 2009-11-04
epub sans DRM

24,21

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Handbook of Digital Forensics and Investigation
Handbook of Digital Forensics and Investigation builds on the success of theHandbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the...

Editeur : Academic Press
Parution : 2009-10-07
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Handbook of Global User Research
User research is global – yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in...

Editeur : Morgan Kaufmann
Parution : 2009-09-30
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  User Experience Re-Mastered
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. The book is organized into four parts. Part 1 deals with the...

Editeur : Morgan Kaufmann
Parution : 2009-09-11
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CompTIA Network+ Certification Study Guide: Exam N10-004
CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuingCompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the...

Editeur : Syngress
Parution : 2009-08-06
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Three exams, two certifications, one complete Cisco training solution for networking professionals!The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material...

Editeur : Syngress
Parution : 2009-06-30
epub sans DRM

40,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Disappearing Cryptography
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity...

Editeur : Morgan Kaufmann
Parution : 2009-06-12
epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco Router and Switch Forensics
Cisco IOS (the software that runs the vast majority ofCisco routers and allCisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable...

Editeur : Syngress
Parution : 2009-06-03
epub sans DRM

40,04

Téléchargement immédiat
Dès validation de votre commande
<< < 2526272829 >