| |
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs.
The impact of computers has not been generally felt in education due to lack of hardware, teacher training, and...
Editeur :
Morgan Kaufmann
Parution :
2010-07-28
epub sans DRM
|
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and...
Editeur :
Morgan Kaufmann
Parution :
2010-07-27
epub sans DRM
|
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...
Editeur :
Springer
Parution :
2010-07-16
Collection :
Advanced Information and Knowledge Processing
ePub
|
Digital Triage Forensics: Processing theDigital Crime Scene provides the tools, training, and techniques inDigital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex...
Editeur :
Syngress
Parution :
2010-07-13
epub sans DRM
|
A Guide for Investigating Network-Based Criminal Cases
Editeur :
Syngress
Parution :
2010-07-02
PDF, epub sans DRM
|
Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will...
Editeur :
Syngress
Parution :
2010-06-04
epub sans DRM
|
Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the...
Editeur :
Syngress
Parution :
2010-06-03
epub sans DRM
|
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and...
Editeur :
Syngress
Parution :
2010-06-02
epub sans DRM
|
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a...
Editeur :
Syngress
Parution :
2010-06-02
epub sans DRM
|
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know...
Editeur :
Wiley
Parution :
2010-04-27
PDF, ePub
|
Thoughts on Interaction Design explores the theory behind the field of Interaction Design in a new way. It aims to provide a better definition of Interaction Design that encompasses the intellectual facets of the field and the particular methods used by practitioners in...
Editeur :
Morgan Kaufmann
Parution :
2010-03-27
epub sans DRM
|
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT...
Editeur :
Wiley
Parution :
2010-03-25
PDF, ePub
|
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy...
Editeur :
Syngress
Parution :
2010-03-13
epub sans DRM
|
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...
Editeur :
Syngress
Parution :
2010-03-03
epub sans DRM
|
Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up...
Editeur :
Syngress
Parution :
2010-03-01
epub sans DRM
|
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and...
Editeur :
Syngress
Parution :
2010-02-27
epub sans DRM
|
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of...
Editeur :
Syngress
Parution :
2010-02-20
epub sans DRM
|
PCI Compliance: Understand and Implement EffectivePCI Data Security Standard Compliance, Second Edition, discusses not only how to applyPCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security...
Editeur :
Syngress
Parution :
2009-11-13
ePub, PDF sans DRM
|
Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.The book begins with a review of important concepts that are needed for successful operating system installation. These include computer...
Editeur :
Syngress
Parution :
2009-11-04
epub sans DRM
|
Handbook of Digital Forensics and Investigation builds on the success of theHandbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the...
Editeur :
Academic Press
Parution :
2009-10-07
epub sans DRM
|