How To Get Rid of Keyloggers
1,156円 How To Get Rid of Keyloggers A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information. These are the most common tools used by hackers and can be very dangerous if you have important information on your computer that...
Flash XML Applications
7,959円 Add seamless, interactive, user-controlled delivery to your Flash applications. This book builds upon your understanding of basic ActionScript (AS) syntax with the foundational skills that you need to use XML in Flash applications and AS2 or AS3 to migrate your existing applications. Beginning wi...
IT Security Management
12,154円 IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the...
Scrappy Business Contingency PlanningDriv...
1,983円 In simple terms, business contingency planning (BCP) is the art of preparing an enterprise for "bad things." The bottom line is that you are trying to enable your organization to withstand an unlikely, though not unexpected, event. But a good business contingency plan should help you weather even...
Real-time Security Extensions for EPCglob...
6,076円 The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, supply chain participants thus need to face the automatic exchange of event data with business par...
Security and Loss Prevention
7,600円 Security and Loss Prevention, Fifth Edition, encompasses the breadth and depth of considerations involved in implementing general loss prevention concepts and security programs within an organization.It presents proven strategies to prevent and reduce incidents of loss due to legal issues, theft ...
Security Management of Next Generation Te...
17,424円 This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications...
Unmasked
257円 Anonymous got lucky. When five of its hackers attacked security company HBGary Federal on February 6, 2011, they were doing so in order to defend the group’s privacy. It wasn’t because they hoped to reveal plans to attack WikiLeaks, create surveillance cells targeting pro-union organizations, and...
Network Security Auditing
9,302円 This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, inclu...
Technological Turf Wars
3,840円 In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illumi...
Computer Misuse
9,948円 This book is concerned with the nature of computer misuse and the legal and extra-legal responses to it. It explores what is meant by the term 'computer misuse' and charts its emergence as a problem as well as its expansion in parallel with the continued progression in computing power, networking...
Mastering Microsoft Forefront UAG 2010 Cu...
4,650円 “Mastering Microsoft Forefront UAG 2010 Customization” is a hands-on guide with step-by-step instructions for enhancing the functionality of UAG through customization. Each topic details one key aspect of functionality and the operative mechanism behind it, and suggests functionality that can be ...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!