Security related eBooks
English | 2006 | ISBN: 1420052195 | PDF | 756 Pages | 16.6 MB User identification and authentication are essential parts of information security. Users must authenticate as they access their computer ...
( Category:Security related Date:13 Jun 2015 )
English | 2013 | ISBN: 1614383642 | 319 Pages | EPUB | 1,1 MB In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard cl...
( Category:Security related Date:12 Jun 2015 )
English | June 4, 2015 | ASIN: B00YXEMVNS | 54 Pages | MOBI/EPUB/PDF | 9.73 MB What if you can't afford to hire a $2,000 web designer? What happens then? You either pay some outrageous monthly fee for...
( Category:Security related Date:10 Jun 2015 )
2004 | 424 Pages | ISBN: 0849316286 | CHM | 4.5 MB Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-...
( Category:Security related Date:09 Jun 2015 )
English | Nov 25, 2002 | ISBN: 1587050250 | 800 Pages | CHM | 13 MB As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile wo...
( Category:Security related Date:09 Jun 2015 )
English | June 1, 2015 | ISBN: 0978574001 | 202 Pages | EPUB/MOBI | 4.58 MB The Definitive Guide to Mac Backups. Your Mac contains valuable and sometimes irreplaceable files-family photos and videos, ...
( Category:Security related Date:06 Jun 2015 )
English | June 2, 2015 | ASIN: B00YT5RREE | 56 Pages | EPUB/MOBI | 3.45 MB This tutorial is designed for everyone: even if you've never programmed before or if you have extensive experience programmin...
( Category:Security related Date:05 Jun 2015 )
English | May 29, 2004 | ISBN: 0321197674 | 384 Pages | CHM | 10 MB "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important securi...
( Category:Security related Date:05 Jun 2015 )
2004 | pages: 358 | ISBN: 0824759397 | PDF | 5,7 mb Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current ap...
( Category:Security related Date:04 Jun 2015 )
English | July 21, 2004 | ISBN: 0735620334 | 592 Pages | PDF | 5 MB Don't wait for an attacker to find and exploit your security vulnerabilities-take the lead by assessing the state of your network's ...
( Category:Security related Date:04 Jun 2015 )
English | ISBN: 1498722032 | 2015 | 187 Pages | PDF | 5 MB In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security t...
( Category:Security related Date:02 Jun 2015 )
2012-12-26 | ISBN: 1849518262 | PDF | 456 Pages | 5.93 MB This book demonstrates how to secure your Java applications from hackers using Spring Security 3.1. With plenty of handholding, it takes you s...
( Category:Security related Date:02 Jun 2015 )
2012-09-26 | ISBN: 1461419808, 1493900366 | PDF | 286 Pages | 4.03 MB The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information...
( Category:Security related Date:02 Jun 2015 )
English | Jan 30, 2007 | ISBN: 0471917109 | 425 Pages | PDF | 6 MB A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated be...
( Category:Security related Date:02 Jun 2015 )
2012-05-29 | ISBN: 1439814465 | PDF | 160 Pages | 2.29 MB The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses eng...
( Category:Security related Date:01 Jun 2015 )