Télécharger le livre :  The Handbook of Global User Research
User research is global – yet despite its pervasiveness, practitioners are not all well equipped to work globally. What may have worked in Nigeria may not be accepted in Russia, may be done differently in Brazil, may partly work in China, and may completely fail in...

Editeur : Morgan Kaufmann
Parution : 2009-09-30
epub sans DRM

43,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  User Experience Re-Mastered
User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. The book is organized into four parts. Part 1 deals with the...

Editeur : Morgan Kaufmann
Parution : 2009-09-11
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CompTIA Network+ Certification Study Guide: Exam N10-004
CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuingCompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the...

Editeur : Syngress
Parution : 2009-08-06
epub sans DRM

57,73

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Three exams, two certifications, one complete Cisco training solution for networking professionals!The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material...

Editeur : Syngress
Parution : 2009-06-30
epub sans DRM

40,61

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Disappearing Cryptography
Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity...

Editeur : Morgan Kaufmann
Parution : 2009-06-12
epub sans DRM

53,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco Router and Switch Forensics
Cisco IOS (the software that runs the vast majority ofCisco routers and allCisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable...

Editeur : Syngress
Parution : 2009-06-03
epub sans DRM

40,61

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit, Second Edition, is a completely updated and expanded version of Harlan Carvey's best-selling forensics book on incident response and investigating cybercrime onWindows systems. With this book, you will learn how to analyze data...

Editeur : Syngress
Parution : 2009-06-01
PDF, epub sans DRM

47,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real Citrix CCA Exam Preparation Kit
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification.The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of...

Editeur : Syngress
Parution : 2009-05-18
epub sans DRM

43,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  SQL Injection Attacks and Defense
Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the...

Editeur : Syngress
Parution : 2009-05-05
epub sans DRM

40,61

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer and Information Security Handbook
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some...

Editeur : Morgan Kaufmann
Parution : 2009-05-04
epub sans DRM

103,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security Governance
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...

Editeur : Wiley
Parution : 2009-04-14
Collection : Wiley Series in Systems Engineering and Management PDF, ePub

109,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road...

Editeur : Syngress
Parution : 2009-04-10
epub sans DRM

43,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security in a Web 2.0+ World
Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...

Editeur : Wiley
Parution : 2009-04-08
PDF

40,13

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Intrusion
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2009-03-17
PDF, ePub

19,26

Téléchargement immédiat
Dès validation de votre commande
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...

Editeur : Wiley
Parution : 2009-03-16
PDF, ePub

29,21

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Forefront Security Administration Guide
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for...

Editeur : Syngress
Parution : 2009-02-07
PDF sans DRM

52,38

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best of 2600, Collector's Edition
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans...

Editeur : Wiley
Parution : 2009-01-26
PDF

92,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Forensics For Dummies
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the...

Editeur : For Dummies
Parution : 2008-11-24
PDF, ePub

36,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hardware-based Computer Security Techniques to Defeat Hackers
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and...

Editeur : Wiley
Parution : 2008-09-22
PDF

133,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Risk
The human element is the principle cause of incidents and accidents in all technology industries; hence it is evident that an understanding of the interaction between humans and technology is crucial to the effective management of risk. Despite this, no tested model...

Editeur : Wiley
Parution : 2008-09-15
PDF

162,59

Téléchargement immédiat
Dès validation de votre commande
<< < 2627282930 >