You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. - Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics - Bonus chapters on how to build your own Forensics Lab - 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowled...
The magazine that helps career moms balance their personal and professional lives.
By examining a suite of over 90 indicators for 9 major US fishery ecosystem jurisdictions, the authors systematically track the progress the country has made towards advancing EBFM and making it an operational reality, lessons which are applicable to oceans globally.
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-auth...
Sharing the Past is an unprecedentedly detailed account of the intertwining discourses of Canadian history and creative literature. When social history emerged as its own field of study in the 1960s, it promised new stories that would bring readers away from the elite writing of academics and closer to the everyday experiences of people. Yet, the academy's continued emphasis on professional distance and objectivity made it difficult for historians to connect with the experiences of those about whom they wrote, and those same emphases made it all but impossible for non-academic experts to be institutionally recognized as historians. Drawing on interviews and new archival materials to construct a history of Canadian poetry written since 1960, Sharing the Past argues that the project of social history has achieved its fullest expression in lyric poetry, a genre in which personal experiences anchor history. Developing this genre since 1960, Canadian poets have provided an inclusive model for a truly social history that indiscriminately shares the right to speak authoritatively of the past.
None