|
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...
Editeur :
Wiley-VCH
Parution :
2007-02-27
PDF
|
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...
Editeur :
Sybex
Parution :
2006-02-20
PDF
|
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...
Editeur :
Wiley-Interscience
Parution :
2005-11-11
PDF
|
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...
Editeur :
Wiley
Parution :
2005-04-01
PDF
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2005-01-26
PDF, ePub
|
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...
Editeur :
For Dummies
Parution :
2004-08-26
PDF, ePub
|
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...
Editeur :
Wiley
Parution :
2004-07-30
PDF
|
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...
Editeur :
Wiley
Parution :
2003-02-13
PDF
|
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...
Editeur :
Wiley
Parution :
2003-02-05
PDF
|
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...
Editeur :
Wiley
Parution :
2002-04-29
Collection :
Technology Briefs Series
PDF
|
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...
Editeur :
Wiley
Parution :
2001-09-18
PDF, ePub
|