Télécharger le livre :  Managing Safety
Ajouter à ma liste d'envies
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...

Editeur : Wiley-VCH
Parution : 2007-02-27

PDF

116,00
Télécharger le livre :  Network Security Foundations
Ajouter à ma liste d'envies
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...

Editeur : Sybex
Parution : 2006-02-20

PDF

24,05
Télécharger le livre :  Information Security
Ajouter à ma liste d'envies
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...

Editeur : Wiley-Interscience
Parution : 2005-11-11

PDF

94,90
Télécharger le livre :  Spies Among Us
Ajouter à ma liste d'envies
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Editeur : Wiley
Parution : 2005-04-01

PDF

25,32
Télécharger le livre :  The Art of Intrusion
Ajouter à ma liste d'envies
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2005-01-26

PDF, ePub

16,35
Télécharger le livre :  Computer Viruses For Dummies
Ajouter à ma liste d'envies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2004-08-26

PDF, ePub

17,30
Télécharger le livre :  Malicious Cryptography
Ajouter à ma liste d'envies
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Editeur : Wiley
Parution : 2004-07-30

PDF

43,25
Télécharger le livre :  Mission-Critical Security Planner
Ajouter à ma liste d'envies
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...

Editeur : Wiley
Parution : 2003-02-13

PDF

52,75
Télécharger le livre :  Hack Attacks Testing
Ajouter à ma liste d'envies
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...

Editeur : Wiley
Parution : 2003-02-05

PDF

48,00
Télécharger le livre :  Biometrics
Ajouter à ma liste d'envies
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...

Editeur : Wiley
Parution : 2002-04-29
Collection : Technology Briefs Series
PDF

40,62
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...

Editeur : Wiley
Parution : 2001-09-18

PDF, ePub

16,88
<< < 456