Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
Hacking Exposed: Network Security Secrets and Solutions is written for network administrators who want to learn the tools and trade of computer hackers, so they can defend their businesses against the
Remoting offers developers many ways to customize the communications process, for efficiency, security, performance and power, and allows seamless integration of components running on several computer
Emphasizing the four primary goals of computer security--confidentiality, authentication, integrity, and non-repudiation--this helpful handbook provides a detailed tutorial on data security models tha
Paris, July 1999: Private investigator Aimée Leduc is coming home from a long day's work in St. Germain, where she is investigating a computer security breach at a university, when she is accosted by
Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system
In 2011, the United Nations Security Council adopted Resolution 1973, authorizing its member states to take measures to protect Libyan civilians from Muammar Gadhafi’s forces. In invoking the “respons
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer infrastructure of the Western world. His compan
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing inf
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
PRACTICAL COMPUTER LITERACY, Third Edition, provides clear, comprehensive instruction on the basics of computer literacy. This convenient, reader-friendly text integrates computer concepts, Microsoft
Launch Your Career in Computer Forensics—Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to l
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
The Computer Graphics Companion offers a comprehensive collection of articles written by selected specialists and spanning a wide range of topics and applications in computer graphics.It brings togeth
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email,
This homework helper explains to kids and parents computer science principles, from hardware to computer coding and what the future may hold. This study aid takes children from age 10 all the way up t
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
My Busy Computer Book is an interactive board book that mimics parents' laptops, including a unique carry handle and laptop shape to help children play their own "computer games," just like
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Now you can master today's most important computer concepts as well as key Microsoft Office 2016 skills with the user-friendly approach found in ILLUSTRATED COMPUTER CONCEPTS AND MICROSOFT OFFICE 365
Gain the full understanding of today's digital world with the cohesive framework and logical organization found only in NEW PERSPECTIVES ON COMPUTER CONCEPTS 2016, ENHANCED, COMPREHENSIVE. This dynami
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
Go beyond computing basics with the award-winning NEW PERSPECTIVES ON COMPUTER CONCEPTS. Designed to get you up-to-speed on essential computer literacy skills, this market leading text goes deeper, pr