|
CompTIA security+ study guide
|
Emmett A. Dulaney |
"The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… |
OL15934060W |
|
Metasploit
|
David Kennedy |
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… |
OL15991444W |
|
Introduction to contextual processing
|
Gregory Vert |
"Develops a Comprehensive, Global Model for Contextually Based Processing Systems A new perspective on global information systems operation Helping to advance a valuable paradigm shift in the next ge… |
OL15998960W |
|
Protecting your internet identity
|
Ted Claypoole |
"Protecting Your Internet Identity: Are you Naked Online? helps readers, young and old alike, understand the implications of their online personas and reputations. The authors offer a guide to the ma… |
OL16318337W |
|
The death of the Internet
|
Markus Jakobsson |
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affec… |
OL16318634W |
|
CISA
|
David L. Cannon |
"The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as th… |
OL16516868W |
|
Policing global movement
|
S. Caroline Taylor,Daniel Joseph Torpy,Das, Dilip K. |
"This book builds on the tradition of previous volumes produced from annual International Police Executive Symposium (IPES) meetings. Three sections highlight the themes of tourism; trafficking; stra… |
OL16704852W |
|
The definitive guide to complying with the HIPAA/HITECH privacy and security rules
|
John J. Trinckes |
"The security standards in HIPAA were developed to implement appropriate security safeguards for the protection of certain Electronic Protected Health Information (EPHI) that may be at risk while per… |
OL22639978W |
|
Core software security
|
James F. Ransome |
"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to… |
OL23325553W |