Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open...
Mobile Cloud Computing: Models, Implementation, and Security
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications. The book focuses on novel and advanced algorithms, as well as mobile app development.
The book begins with an overview of mobile...
Location-Aware Applications is a comprehensive guide to the technology and business of creating compelling location-based services and applications. The book walks you through the LBS landscape, from mapping technologies to available platforms; from toolkits to business questions like monetization...
Anonymous Communication Networks: Protecting Privacy on the Web
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on...
Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal...
Unit and Ubiquitous Internet of Things
Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.
Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous...
|Result Page: 36 35 34 33 32 31 30 29 28 27 |