'A gripping psychological thriller. Readers will be awake deep into the night, trying to untangle the truth' The Times 'Books of the Year'________Autumn, 1615.Frances Carr is imprisoned in a cold, lig
This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security stud
Cyber Safety covers the basics of computer security useful for typical computer users, including the five components of IT Security: firewalls, anti-virus, IDS, networking, and web security. This bo
The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and count
The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and count
The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and count
The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and count
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics
The Computer Forensic Series by EC-Council provides the knowledge and skills to identify, track, and prosecute the cyber-criminal. The series is comprised of four books covering a broad base of topics
This is one of two books in the DISASTER RECOVERY/VIRTUALIZATION SECURITY SERIES, designed to fortify disaster recovery preparation and virtualization technology knowledge of information security stud
Network Safety is a diverse introductory networking book intended for anyone from the average home computer user to an office professional to someone looking to develop a career in information securi
Intended for anyone from the mobile user to a student or professional working in a wireless environment, Wireless Safety serves to expose the reader to diverse technologies while mapping them to real
The finding that working memory training can increase fluid intelligence triggered a great number of cognitive training studies, the results of which have been fiercely debated among experts, and a su
Energy consumption level is a significant indicator in measuring a nation's economic, scientific and technological progress. The energy industry in China is a topic of interest for many researchers, g