Military Strategy, Joint Operations, and Airpower : An Introduction
PDF
Military Strategy, Joint Operations, and Airpower : An Introduction

Military Strategy, Joint Operations, and Airpower will introduce readers to contemporary strategy and the operational level of war, particularly as it relates to airpower. This intermediate textbook was developed as required reading for all US Air Force Academy cadets, and is designed to close the gap between military theory and military practice. It asks readers to reconceive of the military as a “profession of effects” rather than ...

Active Defense: A Comprehensive Guide to Network Security
PDF
Active Defense: A Comprehensive Guide to Network Security

This book covers a broad range of Networking Security. Topics that are generally overlooked in most cases. This book is very general in terms of Overall network security and makes you take a step back and review your security procedures and policies. Easy to understand and follow. A great reference guide to go back to also. The reason I gave this book 4 instead of 5 stars is because I feel that a few of the topics should've been cove...

Cisco Practical Lab Workbook: RIP Protocol
PDF
Cisco Practical Lab Workbook: RIP Protocol

‘Cisco Practical - Lab Workbook: RIP Protocol’ is aimed at supporting your network engineering career. A companion handbook. Communication is clear and straight forward. No rubbish descriptions. Price is affordable. This is a ‘do it yourself’ type Cisco lab practical book with exercises. Before you tryout these exercises, my advice is to be thorough in Cisco networking theory. I took time to run all the exercises in this book myself....

Seguridad en las comunicaciones y en la información
PDF
Seguridad en las comunicaciones y en la información

Cualquier política de administración de redes y sistemas de una organización estará incompleta si no tiene en cuenta una serie de premisas de seguridad. Este libro trata de dar una descripción extensiva de conceptos, terminología, modos de administración y configuración de los dispositivos, programas y aplicaciones dirigidos a conseguir la mejor disponibilidad, fiabilidad y privacidad de los sistemas y redes de una organización.

The Secure Online Business
PDF
The Secure Online Business

The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cybercrime and the ""dark side"" of the Internet are likely to get badly burnt.This important new book highlights the key issues in online risk management, taking the premise that information s...

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
PDF
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined...

Prime Numbers and Computer Methods for Factorization (Progress in Mathematics)
PDF
Prime Numbers and Computer Methods for Factorization

In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large numbers into their primes. Thus an ancient number-theory concept now plays a crucial role in communication among millions of peop...

Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)
PDF
Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)

As the recognized leader in the field of information security education and certification, the (ISC)2® promotes the development of information security professionals around the world. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) examination assesses individuals’ understanding of security management practices. Obtaining certification validates your ability ...

Online Safety for Coders (Kids Get Coding)
PDF
Online Safety for Coders (Kids Get Coding)

How can you stay safe while surfing the Internet? You need to be an Internet superhero! The internet is an exciting world, but there are things you should be careful of as well. Find out how information is used online and how Internet superheroes protect their identities. Then use the link in this book to try fun activities that will boost your superhero skills.

Practical Cloud Security [Early Release]
PDF
Practical Cloud Security

With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-sp...