The modern rapid advancements in networking, communication, and mobility have increased the need for reliable ways to verify the identity of any person. Security and Access Control Using Biometric Te
Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fifth Edition
GUIDE TO WIRELESS COMMUNICATIONS, 3rd Edition is designed for an entry level course in wireless data communications. The text covers the fundamentals wireless communications and provides an overview o
HANDS-ON INFORMATION SECURITY LAB MANUAL, Fourth Edition, helps you hone essential information security skills by applying your knowledge to detailed, realistic exercises using Microsoft Windows 2000,
MANAGEMENT OF INFORMATION SECURITY, Fourth Edition gives readers an overview of information security and assurance using both domestic and international standards, all from a management perspective. B
GUIDE TO WIRELESS COMMUNICATIONS, 3rd Edition is designed for an entry level course in wireless data communications. The text covers the fundamentals wireless communications and provides an overview o
Intended for anyone from the mobile user to a student or professional working in a wireless environment, Wireless Safety serves to expose the reader to diverse technologies while mapping them to real
COMPTIA SECURITY+ SY0-401 IN DEPTH will prepare you to pass CompTIA's new Security+ certification exam and earn this important credential in the field of computer security. Using the proven In Depth c
One of the fastest growing issues in Information Technology (IT) is the increasing need for security, both internal and external, to protect valuable enterprise data and resources. IT security is a mu
Learn how wireless systems work, how mobility is supported, what the underlying infrastructure is and what interactions are needed among different functional components with INTRODUCTION TO WIRELESS A
CISSP GUIDE TO SECURITY ESSENTIALS, Second Edition, provides complete, focused coverage to prepare students and professionals alike for success on the Certified Information Systems Security Profession
CWNA GUIDE TO WIRELESS LANS, 3rd Edition provides you with the conceptual knowledge and hands-on skills needed to work with wireless technology in a network administration environment as well as pass
This textbook introduces students to computers, applications, and concepts. It explains computer hardware and software; networks and the Internet, including security and privacy; and Microsoft Windows
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These attacks can occur internally as well as from an extern
CISSP GUIDE TO SECURITY ESSENTIALS provides readers with the tools and resources they need to develop a thorough understanding of the entire CISSP Certification Body of Knowledge. Using a variety of
Providing essential information for business managers, computer programmers, system designers, as well as home computer users, DATABASE COMMUNICATIONS AND COMPUTER NETWORKS, 8e provides a thorough int
Rubin (U. of Texas at Austin) introduces undergraduate and graduate students in the helping professions to understanding and using statistics in evidence-based practice. After discussing the value and
Achieve success in your physics course by using this value-based, paperback edition of Serway's best-selling PHYSICS FOR SCIENTISTS AND ENGINEERS, Eighth Edition, which includes access to Enhanced Web
READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text
This book explains the general principles of how wireless systems work, how mobility is supported, what the underlying infrastructure is and what interactions are needed among different functional co
MCITP GUIDE TO MICROSOFT WINDOWS SERVER 2008, Server Administration (Exam 70-646) prepares the reader to administer networks using the Microsoft Windows Server 2008 operating system and to pass the MC
Management of Information Security primarily focuses on the managerial aspects of information security, such as access control models, information security governance, and information security program
Learn to program fun and challenging games using Silverlight, a rich, web-based application that is ideal for rapid, casual game development. "Game Programming with Silverlight" shows anyone intereste
For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my co
Designed for the beginner yet useful for the expert, COMPUTER NETWORKING FROM LANS TO WANS: HARDWARE, SOFTWARE, AND SECURITY covers all aspects of computer networking. Hardware details such as the o
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration (Exam 70-642) prepares the reader to configure networks using the Microsoft Windows Server 2008 operating system and to
Designed for students in engineering, science, and pre-med, and using a contextual approach that shows how physics are part of everyday life, the 4th edition of this textbook features a Web-based lear
Hands-On Information Security Lab Manual provides instructors with detailed, hands-on exercises in information security management and practice. This lab text addresses the need for a quality, general
●CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONALS (CISSP) AND CERTIFIED INFORMATION SECURITY MANAGERS (CISM) INFORMATION INTEGRATED THROUGHOUT. The authors have carefully incorporated both CISSP a
Peck, Short, and Olsen's INTRODUCTION TO STATISTICS AND DATA ANALYSIS, 6th Edition stresses interpretation and communication of statistical information through hands-on, activity based learning using
Master fundamental accounting concepts while strengthening your proficiency in working with the market-leading QuickBooks Accountant 2018. Owen's USING QuickBooks ACCOUNTANT 2018 FOR ACCOUNTING, 16E p
Teach students how businesses use spreadsheets and databases in accounting today with USING EXCEL & ACCESS FOR ACCOUNTING 2016. This step-by-step book uses numerous screen images to clearly explai
"An excellent resource in both career development and tests and measurement courses, USING ASSESSMENT RESULTS FOR CAREER DEVELOPMENT, 8e vividly illustrates how to use assessment instruments to increa
Using a problem-based quantitative approach, Striebig, Ogundipe, and Papadakis present a textbook on sustainable design and development that can be used in any field of engineering. The prerequisites
THEORY AND TREATMENT PLANNING IN FAMILY THERAPY: A COMPETENCY-BASED APPROACH prepares readers for the realities of practicing therapy. This book's outcomes-based approach engages readers in an active
This completely updated second edition of MICROCONTROLLERS: FROM ASSEMBLY LANGUAGE TO C USING THE PIC24 FAMILY covers assembly language, C programming, and hardware interfacing for the Microchip PIC24
SOCIETIES, NETWORKS, AND TRANSITIONS connects the different regions of the world within and across chapters, and explores broader global themes in part-opening essays to show you world history in a tr
SOCIETIES, NETWORKS, AND TRANSITIONS connects the different regions of the world within and across chapters, and explores broader global themes in part-opening essays to show you world history in a tr
USING EXCEL & ACCESS FOR ACCOUNTING 2013 teaches students how businesses use spreadsheets and databases in accounting and explains how to use these tools in solving real accounting problems. It is
USING FINANCIAL ACCOUNTING INFORMATION, 9E is a non-debit/credit text known for its strong decision-making focus and its incorporation of flagship companies for increased relevance. This text provides