Mobile Computer Technicians





Mobile Computer Technicians

Computer Repair - Microsoft - DIY Computer - Build Computer

Repair Computer - Computer Memory - Fix Computer - Computer Virus






Analyzing Computer Security

RRP $261.99

Click on the Google Preview image above to read some pages of this book!

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 


A Math Journey Through Computer Games

RRP $19.95

Click on the Google Preview image above to read some pages of this book!

Fun pictograms and infographics about computer games make learning about math topics such as ratios, speed, distance, time, volume, percentages, and equations easy and fun. In this book, readers are presented with several computer game scenarios and must use their mathematical skills to solve equations to up their scores. Math puzzles and exercises help children build confidence in their math skills.


Computer Networking

RRP $441.99

Click on the Google Preview image above to read some pages of this book!

For courses in Networking/Communications

 

Motivates readers with a top-down, layered approach to computer networking

Unique among computer networking texts, the Seventh Edition of the popularComputer Networking: A Top Down Approach builds on the author's long tradition of teaching this complex subject through a layered approach in a "top-down manner." The text works its way from the application layer down toward the physical layer, motivating readers by exposing them to important concepts early in their study of networking. Focusing on the Internet and the fundamentally important issues of networking, this text provides an excellent foundation for readers interested in computer science and electrical engineering, without requiring extensive knowledge of programming or mathematics. TheSeventh Edition has been updated to reflect the most important and exciting recent advances in networking.

 

Note: You are purchasing a standalone product; MyLab & Mastering does not come packaged with this content. Students, if interested in purchasing this title with MyLab & Mastering, ask your instructor for the correct package ISBN and Course ID. Instructors, contact your Pearson representative for more information.

 

If you would like to purchase both the physical text and MyLab & Mastering, search for:

 

0134522206 / 9780134522203    Computer Networking with Modified MasteringComputerScience with Pearson eText -- Access Card Package

 

Package consists of:

  • 0134311167 / 9780134311166    Modified MasteringComputerScience Access Card
  • 0133594149 / 9780133594140  Computer Networking: A Top-Down Approach, 7/e

 


How To Build A Wedding Chapels Business (special Edition)

RRP $18.99

Click on the Google Preview image above to read some pages of this book!

In clear, easy-to-grasp language, the author covers many of the topics that you will need to know in order to launch and run a successful business venture.


Computer-managed Maintenance Systems, Second Edition

RRP $29.99

Click on the Google Preview image above to read some pages of this book!

Effective resource management and reliable equipment are essential for optimum plant performance. Computer-Managed Maintenance Systems goes beyond the simple selection and implementation of a CMMS. It also defines the changes in infrastructure, management philosophy and employee skills that must be implemented to gain maximum benefits from the CMMS. The book is designed to address the information needs of all levels of plant management.

In this new edition, the authors have added a chapter specifically on the latest technology, Application Solution Providers (ASP) that has revolutionized the way CMMS are used and the benefits they can offer to a business. This solution provides integrated software, hardware and networking technology along with Information Technology (IT) consulting services into an outsourced package. A new appendix on Key Performance Indicators has also been added.
Comprehensive, practical guide that covers selection, justification, and implementation of an effective CMMS in any facilityAll levels of plant management will find useful information in this step-by-step guideIncludes a new chapter on ASP technologies



Search

Mobile Computer Technicians Articles

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians Books

Computer Repair Microsoft DIY Computer Build Computer
Repair Computer Computer Memory Fix Computer Computer Virus

Mobile Computer Technicians