Communications category: 4698 books

Cover of An Information Security Handbook
by John M. Hunter
Language: English
Release Date: December 6, 2012

This book is geared at postgraduate courses on managing and designing information systems. It concentrates primarily on security in military systems and looks at the different goals organisations might have in employing security techniques and which techniques are best suited to acheiving certain...
Cover of Trust Management in Cloud Services
by Talal H. Noor, Quan Z. Sheng, Athman Bouguettaya
Language: English
Release Date: November 14, 2014

This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the difficulties of establishing trust...
Cover of Radio and Radio Receivers
by Owen Jones
Language: English
Release Date: January 6, 2016

I hope that you will find the information helpful, useful and profitable. The information in this ebook on various aspects of radio is organised into 15 chapters of about 500-600 words each. I hope that it will interest those who want to get maximum use from their radio apparatus of...
Cover of Who Controls the Internet? : Illusions of a Borderless World
by Jack Goldsmith;Tim Wu
Language: English
Release Date: February 24, 2006

Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers rogue programmers the United Nations or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book Jack Goldsmith and Tim Wu tell the fascinating story of...
Cover of Data Privacy Law

Data Privacy Law

An International Perspective

by Lee Andrew Bygrave
Language: English
Release Date: January 23, 2014

Although over 100 countries have developed data privacy laws, there is a lack of expert guidance on these laws. This text examines the fundamental aims and principles of data privacy law, along with the mechanisms for its enforcement in an international context. Bygrave analyses relevant law from...
Cover of Investigating Cyber Law and Cyber Ethics

Investigating Cyber Law and Cyber Ethics

Issues, Impacts and Practices

by
Language: English
Release Date: September 30, 2011

Ethical values in computing are essential for understanding and maintaining the relationship between computing professionals and researchers and the users of their applications and programs. While concerns about cyber ethics and cyber law are constantly changing as technology changes, the intersections...
Cover of Air Force Doctrine Document 3-12, Cyberspace Operations: Malware, Network Defense, Definitions, Policy and Doctrine, U.S. National Cyberspace Policy, United States Strategic Command
by Progressive Management
Language: English
Release Date: April 16, 2012

Air Force Doctrine Document (AFDD) 3-12, Cyberspace Operations, is the Air Force's foundational doctrine publication for Air Force operations in, through, and from the cyberspace domain. AFDD 3-12 represents known sanctioned ideas and practices in the three chapters described below. This document...
Cover of Field Manual FM 6-02 Signal Support to Operations January 2014
by United States Government US Army
Language: English
Release Date: February 2, 2014

This publication, Field Manual FM 6-02 Signal Support to Operations, describes the Signal Regiment support to the Army’s mission, commanders, staff officers and signal personnel. This manual establishes the Signal Regiment’s roles and responsibilities of organic and non-organic signal forces providing...
Cover of Effective Physical Security
by Lawrence J. Fennelly
Language: English
Release Date: November 25, 2016

Effective Physical Security, Fifth Edition is a best-practices compendium that details the essential elements and latest developments in physical security protection. This new edition is completely updated, with new chapters carefully selected from the author’s work that set the standard. This...
Cover of The Psychology of Information Security
by Leron Zinatullin
Language: English
Release Date: January 26, 2016

This book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronizing or prescriptive, making it an easy read with some very real practical takeaways.
Cover of Beyond E-Business

Beyond E-Business

Towards networked structures

by Paul Grefen
Language: English
Release Date: July 16, 2015

In Beyond E-Business: Towards Networked Structures Paul Grefen returns with his tried and tested BOAT framework for e-business, now fully expanded and updated with the very latest overview of digitally connected business; from business models, organization structures and architecture, to information...
Cover of Mobile Usability
by Jakob Nielsen, Raluca Budiu
Language: English
Release Date: October 9, 2012

How do we create a satisfactory user experience when limited to a small device? This new guide focuses on usability for mobile devices, primarily smartphones and touchphones, and covers such topics as developing a mobile strategy, designing for small screens, writing for mobile, usability comparisons,...
Cover of Network Function Virtualization
by Ken Gray, Thomas D. Nadeau
Language: English
Release Date: July 4, 2016

Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise. Drawing upon years of practical...
Cover of The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy

by Patrick Engebretson
Language: English
Release Date: June 24, 2013

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools...
First 84 85 86 87 88 89 9091 92 93 94 95 96 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy