Sökt på: Sökresultat
totalt 5 träffar
Techno Security's Guide to Securing SCADA
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the …
Low Tech Hacking
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, …
The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer …
TechnoSecurity's Guide to E-Discovery and Digital Forensics
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to …
Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
A team of internationally known IT security experts offers a helpful overview of the world of high-tech security and uses illustrative case studies to examine potential security …