When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern ...
Lire la suite
                It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all ...
Lire la suite
                The text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Lire la suite
                The text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Lire la suite
                Provides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Lire la suite
                Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Lire la suiteFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Lire la suite
                Helps students understand the basics of data communications and networking, and the protocols used in the Internet in particular ...
Lire la suite
                Teaches the principles of networking using TCP/IP protocol suite. It employs a bottom-up approach where each layer in the ...
Lire la suite
                It is ideal for one/two-semester courses in Computer Networks, Data Communications, and Communications Networks in CS, CIS, ...
Lire la suite
                Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Lire la suite
                Learn to deliver superior server-to-server communication through the networking channels Gain expertise of the networking ...
Lire la suite
                It thoroughly prepares you for success on CompTIA's Network+ N10-007 certification exam with fully mapped coverage of all ...
Lire la suite
                Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lire la suite