Télécharger le livre :  Hack Attacks Testing
Ajouter à ma liste d'envies
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...

Editeur : Wiley
Parution : 2003-02-05

PDF

48,00
Télécharger le livre :  Biometrics
Ajouter à ma liste d'envies
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...

Editeur : Wiley
Parution : 2002-04-29
Collection : Technology Briefs Series
PDF

40,62
<< < 131415