This homework helper explains to kids and parents computer science principles, from hardware to computer coding and what the future may hold. This study aid takes children from age 10 all the way up t
The 2018 Edition of Social Security Benefits Including Medicare provides a concise but helpful explanation of the complex rules governing the Social Security retirement, survivors, and disability bene
Social Security and Medicare are the bedrock of your future financial security. You paid for them—now make them work for you, starting today! SOCIAL SECURITY: THE INSIDE STORY is detailed. Compreh
My Busy Computer Book is an interactive board book that mimics parents' laptops, including a unique carry handle and laptop shape to help children play their own "computer games," just like
Discover a managerially-focused overview of information security with a thorough presentation of how to most effectively administer it with MANAGEMENT OF INFORMATION SECURITY, 5E. Insightful, engaging
It’s time to put the “home” back into our homeland. Part prescription and part memoir, this exceptional view of America’s security concerns by a leading government Homeland Security advisor, Pulitzer
Now you can master today's most important computer concepts as well as key Microsoft Office 2016 skills with the user-friendly approach found in ILLUSTRATED COMPUTER CONCEPTS AND MICROSOFT OFFICE 365
Gain the full understanding of today's digital world with the cohesive framework and logical organization found only in NEW PERSPECTIVES ON COMPUTER CONCEPTS 2016, ENHANCED, COMPREHENSIVE. This dynami
Contemporary Security Studies is the definitive introduction to Security Studies, providing the most accessible, up-to-date guide to the subject available. Bringing together leading scholars in the fi
Go beyond computing basics with the award-winning NEW PERSPECTIVES ON COMPUTER CONCEPTS. Designed to get you up-to-speed on essential computer literacy skills, this market leading text goes deeper, pr
This is the first complete, up-to-date, hands-on guide to creating effective information security policies and procedures. It introduces essential security policy concepts and their rationale, thoroug
Contemporary Computer-Assisted Language Learning (CALL) is a comprehensive, one-volume work written by leading international figures in the field focusing on a wide range of theoretical and methodolog
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent
Solar System is the perfect introduction for young readers to the endlessly fascinating topic of space and the vast, mysterious worlds that make up our solar system. Discover the activity of the flami
Introduces readers to the circulatory system; the functions of the heart, arteries and veins; the different types of blood cells; and common problems and diseases that affect the circulatory system.
The need for information security management has never been greater. With constantly changing technology, external intrusions, and internal thefts of data, information security officers face threats
The ONLY official study guide for the industry-standard wireless security certification examCowritten by the creators of the exam and leading experts in wireless security, CWSP Certified Wireless Secu
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security, usually offered under a MIS, IT or eBusiness degree program. The text addresse
Addressing IT managers and staff, as well as CIOs and other executives dealing with corporate IT security, this book provides a broad knowledge on the major security issues affecting today's corporati
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materi
Investigate computer crime, corporate malfeasance, and hacker break-ins quickly and effectively with help from this practical and comprehensive resource. You’ll get expert information on crucial proce
"Take a proactive approach to network security by implementing preventive measures against attacks--before they occur. Written by a team of security experts, this hands-on resource provides concrete s
Enhance security and maintain privacy of mission-critical data, even when going wireless. This book covers 802.11 security for Windows, Linux, Macs, Palms, and other PDAs.
LOCK IN PDA SECURITY:* Let an IT security expert help you assess the PDA threat to your business* Learn what you must do to lock out dangers -- password theft, viruses, electronic eavesdropping, mobil
* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data* Gives security professionals speci
It is vital that today’s engineers work with computer-based tools and techniques. However, programming courses do not provide engineering students with the skills that are necessary to succeed i
Wireless Security End to End is a comprehensive guide covering encryption, PKI, SSL, third party certificate validation, Smart card, pin authentication, device level security, threat analysis, strateg
REAL-WORLD WIRELESS SECURITYThis comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas
Social security is at present the focus of an important economic and political debate. Is the combination of high taxes and high benefits distorting economic incentives? Can the social security syst
A revolutionary approach to digital security as a tool for protecting information assets and building customer loyalty, operational efficiency, and market shareMuch has been written lately about the m
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in
At least two things are certain about world politics today: environmental problems are important, and discourses on security remain powerful. Environment and security have been progressively linked in