| |
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...
Editeur :
Wiley-VCH
Parution :
2007-02-27
PDF
|
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...
Editeur :
Sybex
Parution :
2006-07-14
PDF
|
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...
Editeur :
Wiley-Interscience
Parution :
2005-10-28
PDF
Offre spéciale
-18%
89,95€
|
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...
Editeur :
Wiley
Parution :
2005-04-01
PDF
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2005-01-26
PDF, ePub
Offre spéciale
-10%
15,50€
|
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...
Editeur :
Wiley
Parution :
2003-01-30
PDF
Offre spéciale
-54%
50,00€
|
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...
Editeur :
Wiley
Parution :
2003-01-22
PDF
Offre spéciale
-32%
45,50€
|