🦃 Cozy up with autumn reads! Let our AI Librarian pick your perfect fireside book 🍁
Explore the literary world of this author
Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric ter...
Jumpstart for Network and Systems Administrators
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
Computer Crime Scene Investigation
Despite efforts to safeguard sensitive data and networks, organizations face an ever-growing threat of cyber crime and security violations. These atta...
When Phebe Hedges, a woman in East Hampton, New York, walked into the sea in 1806, she made visible the historical experience of a family affected by ...
A major, comprehensive professional text/reference for designing and maintaining security and reliability. From basic concepts to designing principles...
An overall plan on how to minimize readers risk of becoming a victim, this book was designed to help consumers and institutions ward off this ever-gro...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!Computer crimes call for forensics specialists, people who k...
Optical Networking Best Practices Handbook presents optical networking in a very comprehensive way for nonengineers needing to understand the fundamen...
"This manual includes lab instructions to be carried out using the Jones & Bartlett Learning Virtual Security Cloud Labs powered by Toolwire. These la...
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competito...
Handbook on Planning, Design, Development, and Regulation
Solving Urban Infrastructure Problems Using Smart City Technologies is the most complete guide for integrating next generation smart city technologies...
Building Trusted Applications and Web Services
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are f...
This work shows governments and organizations around the world how satellite encryption helps to preserve vital national secrets, limit attacks on a n...
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privac...
Revision includes coverage of cable industry, home networking and A+ certification....
Bringing Virtual Reality to the Internet
A complete guide to VRML. this book thoroughly explains how to use VRML for creating 3D graphics and virtual reality applications for the Internet. No...
A Guide to Developing and Implementing an Ironclad Ebusiness Privacy Plan
In this timely guide, two acknowledged experts on e-business security issues arm companies that do business online with a complete blueprint for devel...
With each passing day, more and more people depend on the Internet for more and more services. This makes Internet security more important than ever. ...
VRML Clearly Explained thoroughly explains how to master the power of VRML 2.0 and VRML97, whether you are experienced or not. All the newest VRML sta...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Computer crimes call for forensics specialists, people who ...
Storage Area Networks (SANs) enable companies to manage data but many potential users judge them too confusing to use. This volume offers guidance for...
In this comprehensive book, readers will find everything they need to know for setting up and maintaining an Intranet security plan. It covers everyth...
On-line Ordering and Digital Money
This updated version of Electronic Commerce covers everything from building Web sites, the various methods for transacting business on the Internet wi...
Implementing and Supporting Microsoft Systems Management Server 2
As an effective guide to passing the exam and as valuable tool after users begin running SMS 2, this book covers SMS site planning, installation confi...
This crash course provides telecom service providers with everything they need to get a full understanding of this new opportunity....
Strategies for Intranet and World Wide Web Applications
Provides a technical, managerial, and philosophical framework for moving towards three-dimensional, virtual-reality graphics for use with the World Wi...
It is forecasted that cellular systems using digital technology will become the universal method of telecommunications. This book describes and explai...
A comprehensive look at basic holographic principles, commercial applications, and the digital techniques used in creating them. The CD-ROM contains t...