Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 31 - 40 of about 48 related to Computer and Information Security Handbook.    

Wireless Operational Security

John Rittinghouse, PhD, CISM, James F. Ransome, PhD, CISM, CISSP - Computers - 2004 - 468 pages
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be ...
Limited preview - About this book

Official Certified Ethical Hacker Review Guide: For Version 7.1

Steven DeFino, Larry Greenblatt - Computers - 2012 - 416 pages
OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource for anyone interested in pursuing the most recognized, respected hacking certification in ...
Limited preview - About this book

Hands-On Ethical Hacking and Network Defense

Michael T. Simpson - COMPUTERS - 2012 - 464 pages
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers ...
Limited preview - About this book

Official (ISC)2 Guide to the CISSP CBK, Second Edition

Steven Hernandez, CISSP - Computers - 2009 - 968 pages
With each new advance in connectivity and convenience comes a new wave of threats to privacy and security capable of destroying a company’s reputation, violating a consumer’s ...
Limited preview - About this book

Information Security: The Complete Reference, Second Edition

Mark Rhodes-Ousley - Computers - 2013 - 896 pages
Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands ...
Snippet view - About this book

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair - Computers - 2005 - 400 pages
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an ...
Limited preview - About this book

Stealing The Network: How to Own the Box

Syngress - Computers - 2003 - 448 pages
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless ...
Limited preview - About this book

CEH Certified Ethical Hacker All-in-One Exam Guide

Matt Walker, Angela Walker - Computers - 2011 - 712 pages
Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert ...
Limited preview - About this book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition

Chris Davis, Mike Schiller, Kevin Wheeler - Computers - 2011 - 512 pages
Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information ...
Limited preview - About this book

Anti-Hacker Tool Kit, Fourth Edition

Mike Shema - Computers - 2014 - 624 pages
Featuring complete details on an unparalleled number of hacking exploits, this bestselling computer security book is fully updated to cover the latest attack types—and how to ...
Snippet view - About this book

  1. My library
  2. Help
  3. Advanced Book Search