Networking Communications category: 4555 books

Cover of Zero Day

Zero Day

The Threat In Cyberspace

by Robert O'Harrow Jr., The Washington Post
Language: English
Release Date: January 15, 2013

Will the world’s next war be fought in cyberspace?"It's going to happen," said former National Defense University Professor Dan Kuehl. So much of the world’s activity takes place on the internet now – including commerce, banking and communications -- the Pentagon has declared war in cyberspace...
Cover of Computer Security Basics

Computer Security Basics

Computer Security

by Rick Lehtinen, G.T. Gangemi Sr.
Language: English
Release Date: September 20, 2011

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original...
Cover of Official (ISC)2® Guide to the ISSAP® CBK
by
Language: English
Release Date: January 6, 2017

Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the six domains of the ISSAP CBK, but also need to have the ability to apply this in-depth knowledge to develop a detailed security architecture. Supplying an authoritative review...
Cover of CASP CompTIA Advanced Security Practitioner Study Guide
by Michael Gregg
Language: English
Release Date: October 15, 2014

NOTE: The exam this book covered, CASP: CompTIA Advanced Security Practitioner (Exam CAS-002), was retired by CompTIA in 2019 and is no longer offered. For coverage of the current exam CASP+ CompTIA Advanced Security Practitioner: Exam CAS-003, Third Edition, please look for the latest edition of...
Cover of Microsoft Exchange Server 2007 Administrator's Companion
by Walter Glenn, Scott Lowe, Joshua Maher
Language: English
Release Date: June 18, 2008

Get your mission-critical messaging and collaboration systems up and running with the essential guide to deploying and managing Exchange Server 2007, now updated for SP1. This comprehensive administrator’s reference covers the full range of server and client deployments, unified communications,...
Cover of BlackBerry Hacks

BlackBerry Hacks

Tips & Tools for Your Mobile Office

by Dave Mabe
Language: English
Release Date: October 13, 2005

The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than just web surfing and email? BlackBerry...
Cover of Seven Deadliest Wireless Technologies Attacks
by Brad Haines
Language: English
Release Date: March 13, 2010

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including...
Cover of Windows Server 2003 Network Administration

Windows Server 2003 Network Administration

Building and Maintaining Problem-Free Windows Networks

by Craig Hunt, Roberta Bragg
Language: English
Release Date: September 8, 2005

This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and configure the services based on these protocols....
Cover of Privacy Online: The Practical Privacy Guide For Anyone
by Roger Fassinou
Language: English
Release Date: February 14, 2015

Nowadays, everyone takes security as a serious matter: individuals, companies, institutions, organizations, and government. Everyone cares about privacy; well, I hope you too. At some point, people usually do not want information to be released for various reasons; for instance, what will happen if...
Cover of Rolling Out 5G

Rolling Out 5G

Use Cases, Applications, and Technology Solutions

by Biljana Badic, Christian Drewes, Ingolf Karls
Language: English
Release Date: June 2, 2016

Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towards the next generation – 5G. You'll investigate key changes and additions to 5G in terms of use cases....
Cover of Malware Diffusion Models for Modern Complex Networks
by Vasileios Karyotis, M.H.R. Khouzani
Language: English
Release Date: February 2, 2016

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets,...
Cover of Googling Security

Googling Security

How Much Does Google Know About You?

by Greg Conti
Language: English
Release Date: October 10, 2008

What Does Google Know about You? And Who Are They Telling?   When you use Google’s “free” services, you pay, big time–with personal information about yourself. Google is making a fortune on what it knows about you…and you may be shocked by just how much Google does know. Googling Security...
Cover of Database Nation

Database Nation

The Death of Privacy in the 21st Century

by Simson Garfinkel
Language: English
Release Date: December 4, 2000

Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day...
Cover of Cybercrime and Espionage

Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
Language: English
Release Date: January 7, 2011

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from...
First 53 54 55 56 57 58 5960 61 62 63 64 65 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy