Security related eBooks
2014 | 116 Pages | ISBN: 1783550996 | EPUB, MOBI, PDF | 15 MB Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges ...
( Category:Security related Date:01 Jun 2016 )
2009 | 240 Pages | ISBN: 1435483626 | PDF | 13 MB The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network secu...
( Category:Security related Date:01 Jun 2016 )
* ITIL key concepts, vocabulary, models, roles, and relationships * The main processes of ITIL's five core publications: Service Strategy, Service Design, Service Transition, Service Operations, and C...
( Category:Security related Date:31 May 2016 )
English | 2011 | ISBN: 1118026470 | MOBI | 914 Pages | 8 MB The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations,...
( Category:Security related Date:27 May 2016 )
2014 | 60 Pages | ISBN: 1118904559 , B00KFM16JW | PDF | 3 MB Protect your privacy and use the internet safely!Don't let news about internet risks deter you from taking full advantage of its benefits! ...
( Category:Security related Date:27 May 2016 )
2016 | ISBN-10: 1498723187 | 604 Pages | PDF | 12 MB The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of h...
( Category:Security related Date:25 May 2016 )
English | ISBN: 1780171757 | 2013 | 288 Pages | EPUB | 2 MB Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today's ...
( Category:Security related Date:25 May 2016 )
English | Oct. 23, 2008 | ISBN: 1420063804 | 334 Pages | PDF | 2 MB Threats to application security continue to evolve just as quickly as the systems that protect against cyber-threats. In many instan...
( Category:Security related Date:24 May 2016 )
English | ISBN: 1466683872 | 2015 | 419 Pages | PDF | 15 MB Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the tec...
( Category:Security related Date:24 May 2016 )
English | June 9, 2008 | ISBN: 1402083904 | 350 Pages | PDF | 6 MB Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio ...
( Category:Security related Date:22 May 2016 )
2016 | ISBN-10: 1498740545 | 342 Pages | PDF | 18 MB The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governan...
( Category:Security related Date:22 May 2016 )
2016 | ISBN-10: 148224327X | 604 Pages | PDF | 21 MB Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data m...
( Category:Security related Date:22 May 2016 )
English | July 20, 2004 | ISBN: 0824759796 | 373 Pages | PDF | 2 MB Written from the perspective of prevention, Disaster & Recovery Planning: A Guide for Facility Managers focuses on identifying the i...
( Category:Security related Date:22 May 2016 )
English | Nov. 28, 2007 | ISBN: 0754660567 | 152 Pages | PDF | 3 MB The war on terror cannot be truly understood without investigating the legitimacy of modernity, the challenge that religion presents...
( Category:Security related Date:21 May 2016 )
1. CUCM Multisite: Understanding the Big Picture Design (10 min) 2. Multisite Connections: Connection Options (12 min) 3. Multisite Connections: Implementing H.323 and MGCP Gateway Connections (16 min...
( Category:Security related Date:20 May 2016 )