for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting... Læs mere
Bemærk: Kan ikke leveres før jul.
There is increasing agreement that we need to design secure computer systems that people can actually use, but less agreement about how to reach this goal. This work collects 34... Læs mere
Bemærk: Kan ikke leveres før jul.
SNORT, the defacto standard of intrusion detection tools, can save countless headaches; the new SNORT Cookbook will save countless hours of trial and error. Each "recipe" offers a clear... Læs mere
Bemærk: Kan ikke leveres før jul.
'Smart Home Hacks' covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Learn how to equip... Læs mere
Bemærk: Kan ikke leveres før jul.
This text provides the strategies, tips and tricks needed to secure a Windows system from viruses. It teaches what viruses can and cannot do and how to recognize, remove, and prevent them.
Bemærk: Kan ikke leveres før jul.
A guide to setting up systems that can utilize the Internet to access and send information from one network to another, yet remain secure from unauthorized viewers. Four specific solutions are treated, including Layer two tunneling through PPTP or L2TP.
Bemærk: Kan ikke leveres før jul.
SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations... Læs mere
Bemærk: Kan ikke leveres før jul.
This compelling expose explores the shadowy world of the people responsible for today's junk-email epidemic. Investigative journalist Brian McWilliams delivers a fascinating account of the... Læs mere
Bemærk: Kan ikke leveres før jul.
Providing how-to information on retro gaming, this is a guide to playing and hacking classic games. The author aims to locate the convergence of classic games and contemporary... Læs mere
Bemærk: Kan ikke leveres før jul.
The book describes data-driven approach to optimal monitoring and alerting in distributed computer systems. It interprets monitoring as a continuous process aimed at... Læs mere
Bemærk: Kan ikke leveres før jul.
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.
Bemærk: Kan ikke leveres før jul.
Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps.