| |
User research is global – yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in...
Editeur :
Morgan Kaufmann
Parution :
2009-09-30
epub sans DRM
|
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. The book is organized into four parts. Part 1 deals with the...
Editeur :
Morgan Kaufmann
Parution :
2009-09-11
epub sans DRM
|
CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuingCompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the...
Editeur :
Syngress
Parution :
2009-08-06
epub sans DRM
|
Three exams, two certifications, one complete Cisco training solution for networking professionals!The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material...
Editeur :
Syngress
Parution :
2009-06-30
epub sans DRM
|
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity...
Editeur :
Morgan Kaufmann
Parution :
2009-06-12
epub sans DRM
|
Cisco IOS (the software that runs the vast majority ofCisco routers and allCisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable...
Editeur :
Syngress
Parution :
2009-06-03
epub sans DRM
|
Windows Forensic Analysis DVD Toolkit, Second Edition, is a completely updated and expanded version of Harlan Carvey's best-selling forensics book on incident response and investigating cybercrime onWindows systems. With this book, you will learn how to analyze data...
Editeur :
Syngress
Parution :
2009-06-01
PDF, epub sans DRM
|
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification.The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of...
Editeur :
Syngress
Parution :
2009-05-18
epub sans DRM
|
Winner of the Best Book Bejtlich Read in 2009 award!
"SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/
SQL injection represents one of the...
Editeur :
Syngress
Parution :
2009-05-05
epub sans DRM
|
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some...
Editeur :
Morgan Kaufmann
Parution :
2009-05-04
epub sans DRM
|
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...
Editeur :
Wiley
Parution :
2009-04-14
Collection :
Wiley Series in Systems Engineering and Management
PDF, ePub
|
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road...
Editeur :
Syngress
Parution :
2009-04-10
epub sans DRM
|
Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...
Editeur :
Wiley
Parution :
2009-04-08
PDF
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2009-03-17
PDF, ePub
|
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...
Editeur :
Wiley
Parution :
2009-03-16
PDF, ePub
|
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for...
Editeur :
Syngress
Parution :
2009-02-07
PDF sans DRM
|
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans...
Editeur :
Wiley
Parution :
2009-01-26
PDF
|
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the...
Editeur :
For Dummies
Parution :
2008-11-24
PDF, ePub
|
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and...
Editeur :
Wiley
Parution :
2008-09-22
PDF
|
The human element is the principle cause of incidents and accidents in all technology industries; hence it is evident that an understanding of the interaction between humans and technology is crucial to the effective management of risk. Despite this, no tested model...
Editeur :
Wiley
Parution :
2008-09-15
PDF
|