Security related eBooks
English | Nov 1, 2005 | ISBN: 1931769508 | 480 Pages | CHM | 4 MB Concentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates h...
( Category:Security related Date:17 Mar 2015 )
2008 | pages: 238 | ISBN: 3540850732 | PDF | 2,4 mb The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an ov...
( Category:Security related Date:17 Mar 2015 )
English | Dec 16, 2004 | ISBN: 0309091241 | 341 Pages | PDF | 14 MB For years proposals for gun control and the ownership of firearms have been among the most contentious issues in American politics. ...
( Category:Security related Date:16 Mar 2015 )
English | Sep 3, 2007 | ISBN: 1587053322 | 469 Pages | PDF | 12 MB Information security practices have evolved from Internet perimeter protection to an in-depth defense model in which multiple counter...
( Category:Security related Date:16 Mar 2015 )
Springer | 2008 | ISBN: 0387799834 | 138 pages | PDF | 2 MB IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wid...
( Category:Security related Date:15 Mar 2015 )
English | Feb 20, 2006 | ISBN: 0764595814 | ASIN: 0782144357 | 580 Pages | PDF | 23 MB Guidance Software's EnCase product is the premier computer forensics tool on the market, used in law enforcement ...
( Category:Security related Date:13 Mar 2015 )
2009 | ISBN: 981427108X | 460 pages | PDF | 5,4 MB Security issues in ad-hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issue...
( Category:Security related Date:13 Mar 2015 )
2008 | pages: 280 | ISBN: 3540782427 | PDF | 6,3 mb Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide securi...
( Category:Security related Date:13 Mar 2015 )
2010 | pages: 432 | ISBN: 0071633561 | PDF | 4,6 mb Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code...
( Category:Security related Date:13 Mar 2015 )
2007 | pages: 377 | ISBN: 0521837642 | PDF | 1,9 mb E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secur...
( Category:Security related Date:13 Mar 2015 )
Download: http://longfiles.com/fwhduuy1qvpm/CCNP_ONT_Official_Exam_Certification_Guide.pdf.html...
( Category:Security related Date:12 Mar 2015 )
2014 | 360 Pages | ISBN: 1493910272 | PDF | 5 MB In this volume, contributors from academia, industry, and policy explore the inter-connections among economic development, socio-political democracy, a...
( Category:Security related Date:11 Mar 2015 )
2014 | 292 Pages | ISBN: 3319100815 | PDF | 9 MB FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer...
( Category:Security related Date:11 Mar 2015 )
2014 | 188 Pages | ISBN: 3319082302 | PDF | 19 MB How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect ...
( Category:Security related Date:11 Mar 2015 )
2007 | pages: 528 | ISBN: 0849383285 | PDF | 6,1 mb Designed as an introduction and overview to the field, Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Compute...
( Category:Security related Date:11 Mar 2015 )