| |
In the years since Jakob Nielsen's classic collection on interface consistency first appeared, much has changed, and much has stayed the same. On the one hand, there's been exponential growth in the opportunities for following or disregarding the principles of interface...
Editeur :
Morgan Kaufmann
Parution :
2014-06-28
PDF sans DRM
|
How do you, as a busy security executive or manager, stay current with evolving issues, familiarize yourself with the successful practices of your peers, and transfer this information to build a knowledgeable, skilled workforce the times now demand? With Security Leader...
Editeur :
Elsevier
Parution :
2014-05-24
epub sans DRM
|
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...
Editeur :
Syngress
Parution :
2014-05-20
epub sans DRM
|
Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the...
Editeur :
Butterworth-Heinemann
Parution :
2014-05-20
PDF sans DRM
|
Computer Security, Second Edition aims to present different ideas and practices that promote the prevention of attacks on computer systems and data being compromised. The book is divided into five parts. Part I covers the important elements of computer security and...
Editeur :
Butterworth-Heinemann
Parution :
2014-05-20
PDF sans DRM
|
Breakdowns in Computer Security: Commentary and Analysis is a compendium of 100 genuine incidents that have taken place in the past three or so years. The book describes computer breakdown incidents during the years 1988-1990 and provides to each incident a short...
Editeur :
Elsevier
Parution :
2014-05-16
PDF sans DRM
|
Security for Small Computer Systems: A Practical Guide for Users is a guidebook for security concerns for small computers. The book provides security advice for the end-users of small computers in different aspects of computing security. Chapter 1 discusses the...
Editeur :
Elsevier
Parution :
2014-05-16
PDF sans DRM
|
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...
Editeur :
Syngress
Parution :
2014-04-18
PDF, epub sans DRM
|
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.
Drawing upon years of practical...
Editeur :
Syngress
Parution :
2014-04-07
epub sans DRM
|
The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method.The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the...
Editeur :
Morgan Kaufmann
Parution :
2014-03-21
epub sans DRM
|
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...
Editeur :
Syngress
Parution :
2014-03-11
epub sans DRM
|
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields...
Editeur :
Wiley-ISTE
Parution :
2014-02-19
PDF, ePub
|
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat...
Editeur :
Wiley
Parution :
2014-02-12
PDF, ePub
|
Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive...
Editeur :
Wiley
Parution :
2014-02-03
PDF, ePub
|
Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...
Editeur :
Wiley
Parution :
2014-01-27
PDF, ePub
|
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data...
Editeur :
Wiley
Parution :
2014-01-24
PDF, ePub
|
The Art of Investigative Interviewing, Third Edition can be used by anyone who is involved in investigative interviewing. It is a perfect combination of real, practical, and effective techniques, procedures, and actual cases. Learn key elements of investigative...
Editeur :
Butterworth-Heinemann
Parution :
2013-12-27
epub sans DRM
|
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...
Editeur :
Syngress
Parution :
2013-12-05
epub sans DRM
|
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.
Network security monitoring is...
Editeur :
Syngress
Parution :
2013-11-26
epub sans DRM
|
Much of the work of user-centered design practitioners involves some type of interviewing. While interviewing is an important skill, many colleagues have little or no formal training in interviewing methods and often learn on the job with limited feedback on the quality...
Editeur :
Morgan Kaufmann
Parution :
2013-11-23
epub sans DRM
|