Die Unglaublichen 2 Action, Abenteuer, Animation | The Man who Killed Don Quixote Abenteuer, Komödie, Drama | Venom Action, Sci-Fi, Horror
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)
Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)

Conquering cyber attacks requires a multi-sector, multi-modalapproach

Cyber Threat! How to Manage the Growing Risk of CyberAttacks is an in-depth examination of the very real cybersecurity risks facing all facets of government and industry, andthe various factors that must align to maintain informationintegrity....

BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Linked Data: Structured Data on the Web
Linked Data: Structured Data on the Web

Summary

Linked Data presents the Linked Data model in plain, jargon-free language to Web developers. Avoiding the overly academic terminology of the Semantic Web, this new book presents practical techniques, using everyday tools like JavaScript and Python.

About this Book

...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade
The Weed Runners: Travels with the Outlaw Capitalists of America's Medical Marijuana Trade


Make no mistake: the US government’s hundred-year-old war on marijuana isn’t over. Some 20 million Americans have been arrested on marijuana charges so far. The American marijuana industry remains underground, where modern-day moonshiners who view themselves as...

Cyber Security Policy Guidebook
Cyber Security Policy Guidebook

Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of...

Agile Business Rule Development: Process, Architecture, and JRules Examples
Agile Business Rule Development: Process, Architecture, and JRules Examples

According to Wordnet, a rule is “a principle or condition that customarily governs behavior” or “a prescribed guide for conduct or action.” Businesses, and organizations in general, operate under a number of rules: rules about what services to offer and to whom; rules about how much to charge for those services;...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Tile-Based Geospatial Information Systems: Principles and Practices
Tile-Based Geospatial Information Systems: Principles and Practices

Tile-based online mapping systems have replaced traditional Web GIS systems, because of their improved speed and usability. The trend towards tile-base systems was started by Internet services companies, such as Google, Yahoo, and Microsoft. They have been followed by the traditional GIS community, government organizations and open source...

Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series)
Continuous Integration: Improving Software Quality and Reducing Risk (The Addison-Wesley Signature Series)
For any software developer who has spent days in “integration hell,” cobbling together myriad software components, Continuous Integration: Improving Software Quality and Reducing Risk illustrates how to transform integration from a necessary evil into an everyday part of the development process. The key, as the...
The CISSP and CAP Prep Guide: Platinum Edition
The CISSP and CAP Prep Guide: Platinum Edition

An extensively updated version of the bestselling single-source study guide on the market, The CISSP and CAP Prep Guide: Platinum Edition, provides a complete study resource for the full spectrum of security certifications. It provides unparalleled breadth and depth of coverage of the numerous major changes to the CISSP exam, the new...

Result Page: 76 75 74 73 72 71 70 69 68 67 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy