Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along
This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompT
Cyber security expert Jeff Aiken knows that no computer system is secure. When he's called to investigate a possible breach of the New York Stock Exchange, he discovers that not only has their system
"Network security: fast & fun? If you think a background in computer science is necessary for understanding information security, think again. Network Security Illustrated explores information securit
A comprehensive study of XML and computer security explains how to use XML Signatures to ensure the security and integrity of XML documents, demonstrates how to counteract specific security breaches t
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The tex
* Provides practical solutions, not just principles of security.* Offers an in depth toolkit to the reader and explains how to use the tools to build a secure system.* Introduces concepts of security
First introduced in 2001, Kersting’s Distribution System Modeling and Analysis is the only textbook on computational modeling for electric power distribution systems. Computer models are only as good
Essential IT Skills for On-the-Job SuccessMike Meyers, one of the premier computer and network skills trainers, has developed a learning system designed to explain key IT principles in an easy-to-unde
Hacking Exposed: Network Security Secrets and Solutions is written for network administrators who want to learn the tools and trade of computer hackers, so they can defend their businesses against the
From the official Oracle Press comes a comprehensive guide to implementing a sound security plan in your Oracle environment. This expert resource explains how to secure the operating system, the datab
Emphasizing the four primary goals of computer security--confidentiality, authentication, integrity, and non-repudiation--this helpful handbook provides a detailed tutorial on data security models tha
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing inf
Remoting offers developers many ways to customize the communications process, for efficiency, security, performance and power, and allows seamless integration of components running on several computer
This guide for security professionals, system administrators, and auditors describes how to implement enterprise-wide security solutions based on detailed traffic and attack analysis. It is intended t
These essays from the journal International Security examine the effects of the nuclear revolution on the international system and the role nuclear threats have played in international crises. The aut
Learn to protect your online business using this insightful and practical guide to computer security. Through use of real examples, you'll understand and address the risks associated with using email,
Paris, July 1999: Private investigator Aimée Leduc is coming home from a long day's work in St. Germain, where she is investigating a computer security breach at a university, when she is accosted by
My Busy Computer Book is an interactive board book that mimics parents' laptops, including a unique carry handle and laptop shape to help children play their own "computer games," just like
In 2008 a pseudonymous computer programmer going by the name Satoshi Nakamoto published a white paper titled Bitcoin: A Peer-to-Peer Electronic Cash System” and invented the first workable, completely
Windows 10 in Easy Steps provides full-color and comprehensive coverage of the new operating system and shows how to get the most out of it, whether you are using a desktop computer or a mobile device
It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer infrastructure of the Western world. His compan
Reflecting the latest developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, 4e provides the most current coverage available while thoroughly
Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their ow
PRACTICAL COMPUTER LITERACY, Third Edition, provides clear, comprehensive instruction on the basics of computer literacy. This convenient, reader-friendly text integrates computer concepts, Microsoft
This powerful expose reveals how America's ailing prison system undermines the public trust. For ten years, David Matlin taught at a maximum-security prison, where he confronted daily the nature of so
Launch Your Career in Computer Forensics—Quickly and Effectively Written by a team of computer forensics experts, Computer Forensics JumpStart provides all the core information you need to l
Windows is the number one operating system in the world. There's a lot to Windows XP, with office productivity applications, multimedia features, the Internet, and security upgrades. Now and then, yo
Windows is the world's most popular operating system, and Windows For Dummies is the bestselling computer book ever. When you look at Windows XP For Dummies, 2nd Edition, it's easy to see why. Here's
Bulletproof your system before you are hacked! From the publisher of the international best-seller, Hacking Exposed, here is a brilliant new offering written with a passion for security that will help
Automotive Technology: The Electronic Classroom is a complete teaching/learning system using text and multimedia resources for a computer centered approach. Each volume in the series consists of a hig
Essential IT Skills for On-the-Job SuccessMike Meyers, one of the premier computer and network skills trainers, has developed a learning system designed to teach key IT principles in an easy-to-unders
Here's the quickest means to network security. Information systems security consultant Mike Horton provides trustworthy tips to help IT professionals deliver ready-made hacking and security architectu
The Computer Graphics Companion offers a comprehensive collection of articles written by selected specialists and spanning a wide range of topics and applications in computer graphics.It brings togeth
Cisco Security Bible joins 2 hot topics -- security and Cisco -- in one comprehensive volume on installing, configuring, operating and managing the popular and effective Cisco network security product
Windows 2000 Professional from Microsoft Corporation is positioned as the next-generation business operating system with enhanced security, additional networking power, and updated Internet access. W
Mac OS 9 is a big, complicated personal computer operating system. Mac OS 9 For Dummies is a not-so-big, not-very-complicated book that shows you what Mac OS 9 is all about without boring you, confus