Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders).

This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives covered in a chapter are clearly
...
IP Addressing and Subnetting, Including IPv6
IP Addressing and Subnetting, Including IPv6
This book covers every aspect of the current version, as well as what will be a widespread migration starting in late 1999. These include: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy and an increased number of addressable nodes; supporting simpler auto-configuration of addresses;...
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System
This book’s primary goal is to help you prepare to take and pass Microsoft’s exam number
70-290, Managing and Maintaining a Microsoft Windows Server 2003 Environment. Our secondary
purpose in writing this book is to provide exam candidates with knowledge and
skills that go beyond the minimum requirements for passing the
...
Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom Shinder's Configuring ISA Server 2004

This book is based in large part on our own trials and tribulations (as well as the occasional “Eureka!” moment) that we’ve experienced working with ISA Server 2004. In this book, we are talking to people much like ourselves—experienced Windows network administrators who want to secure their networks and speed up Web...

Nessus Network Auditing (Jay Beale's Open Source Security)
Nessus Network Auditing (Jay Beale's Open Source Security)

Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus Project Founder Renaud Deraison and...

Inside the Spam Cartel
Inside the Spam Cartel

Since the explosion of Internet users during the late 1990’s, the unending spam scourge has shown no sign of abating. Statistics from large anti-spam companies that monitor millions of e-mails per hour show that the rates are actually still going up, and depending who you listen to, they are now rising between 50 and...

Check Point NG/AI: Next Generation with Application Intelligence Security Administration
Check Point NG/AI: Next Generation with Application Intelligence Security Administration

In Check Point Next Generation with Application Security Administration you will cover the basic concepts of security and how to configure a simple firewall all the way to some very advanced VPN scenarios. This book is written by experts in the field as well as certified instructors to give the depth desired by the most advanced users,...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy