Computer insecurity -- Many current computer systems have only limited security precautions in place. Serious financial damage has been caused by computer security breaches, but reliably estimating costs is quite ... > full article
Cryptography -- Cryptography is the field concerned with linguistic and mathematical techniques for securing information, particularly in communications. The study of how to circumvent the use of cryptography is ... > full article
Computer security -- Computer security is a field of computer science concerned with the control of risks related to computer use.
The means traditionally taken to realize this objective is to attempt to create a ... > full article
Identity theft -- Identity theft (or identity fraud) is the deliberate assumption of another person's identity, usually to gain access to their finances or frame them for a ... > full article
Security engineering -- Security engineering is the field of engineering dealing with the security and integrity of real-world systems. It is similar to systems engineering in that its motivation is to make a system meet ... > full article
Cyber security standards -- Cyber security standards are security standards which enable organizations to practice safe security techniques in order to minimize the number of successful cyber security ... > full article
Phishing -- In computing, phishing is a criminal activity using social engineering techniques. Phishers attempt to fraudulently acquire sensitive information, such as passwords and credit card details, by ... > full article
Computer virus -- A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a ... > full article
Malware -- Malware ("malicious software") is software designed to infiltrate or damage a computer system, without the owner's consent. The term describes the intent of the creator, rather than any particular ... > full article
Wi-Fi -- Wi-Fi (also WiFi, Wi-fi, Wifi, or wifi) is a brand licensed by the Wi-Fi Alliance to products which pass testing demonstrating that they implement a set of product compatibility standards for ... > full article
MySQL (3rd Edition) (Developer's Library)
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a ... > read more
Technology In Action- Introductory (2nd Edition)
This book was designed to spark reader interest by covering practical concepts that they want to learn (such as setting up a wireless network in their home) while giving background information (such ... > read more
Programming the Universe : A Quantum Computer Scientist Takes On the Cosmos
Is the universe actually a giant quantum computer? According to Seth Lloyd—Professor of Quantum-Mechanical Engineering at MIT and originator of the first technologically feasible design for a ... > read more
The Little SAS Book: A Primer, Third Edition
Getting started with SAS is easy with The Little SAS Book. This friendly, easy-to-read guide gently introduces you to the most commonly used features of SAS software plus a whole lot more! The book ... > read more
Decoding the Universe: How the New Science of Information Is Explaining Everything in the Cosmos, from Our Brains to Black Holes
As Charles Seife reveals in this energetic new book, information theory, once the province of philosophers and linguists, has emerged as the crucial science of our time, shedding new light on the ... > read more
National Electrical Code 2002 (softcover) (National Fire Protection Association National Electrical Code)
The #1 electrical reference, the 2002 National Electrical Code®, is now available through today's #1 electrical publisher, Delmar Publishers! The single most important reference in the ... > read more
Getting to Know ArcGIS Desktop: The Basics of ArcView, ArcEditor, and ArcInfo Updated for ArcGIS 9 (Getting to Know series)
With revised material and new exercises based on ArcGIS version 9, this updated work acquaints geographers and GIS professionals with the principles of GIS as it teaches the mechanics of using ArcGIS ... > read more
Curves
If you don't mind wading through subtly persistent salesmanship throughout the book, the Curves guide has a wealth of practical advice that clearly continues to help women around the world achieve ... > read more
Bayesian Data Analysis, Second Edition
Incorporating new and updated information, this second edition of THE bestselling text in Bayesian data analysis continues to emphasize practice over theory, describing how to conceptualize, ... > read more
Fear Less: Real Truth About Risk, Safety, and Security in a Time of Terrorism
In this age of uncertainty we are all looking for answers. Every day we cope with another report. Anthrax in New York, Florida and Washington, D.C. Arrests nationwide. Threats from Afghanistan. While ... > read more