Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Shellcoder's Programming Uncovered
Shellcoder's Programming Uncovered
Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.

How hackers, viruses, and worms attack computers from the Internet and exploit security holes
...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Security Awareness: Applying Practical Security in Your World
Security Awareness: Applying Practical Security in Your World

For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? SECURITY AWARENESS:...

Code Optimization: Effective Memory Usage
Code Optimization: Effective Memory Usage

A guide to optimizing programs on the PC and Unix platforms, this book covers the expediency of optimization and the methods to increase the speed of programs via optimization. Discussed are typical mistakes made by programmers that lessen the performance of the system along with easily implemented solutions. Detailed descriptions of the...

Endpoint Security
Endpoint Security
This book makes the assumption that if we've been doing the same thing for years and we continue to fail then we must be doing something wrong. Some basic assumption about what we're doing and why we're doing it is incorrect. Yes, incorrect. But we continue to behave as if nothing is wrong. The pain is there but now the problem is that...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

Configuring Symantec AntiVirus Corporate Edition
Configuring Symantec AntiVirus Corporate Edition
At some time in the last 15 years many of us blinked, and upon opening our eyes
we found the world on the verge of becoming one large network. Public and
private networks were interconnected both far and near, and now in your corner
of this interconnected puzzle, virus protection for the network has become
your
...
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)
Malicious Mobile Code: Virus Protection for Windows (O'Reilly Computer Security)

Here are some sure things: you can't get a virus by simply reading an email. Malicious code can't harm hardware. A virus can't hide from a booted, write-protected diskette. Your computer can't get infected from a picture file. I have given this advice hundreds of times and could repeat it in my sleep. It was the mantra of every...

Setting Up LAMP: Getting Linux, Apache, MySQL, and PHP Working Together
Setting Up LAMP: Getting Linux, Apache, MySQL, and PHP Working Together
You could think of Setting Up LAMP as four books in one, but it's actually something much more valuable: a single volume that presents the open-source technologies known collectively as LAMP— Linux, Apache, MySQL, and PHP—as tightly dovetailed components of today’s most affordable and effective platform...
Windows NT File System Internals : A Developer's Guide
Windows NT File System Internals : A Developer's Guide
Writing kernel-mode Windows NT programs--such as file-system drivers (FSDs), filter drivers, and antivirus programs--poses a challenge to even experienced Windows programmers. It's hard enough to get these programs to work, but getting them to live peacefully with other kernel programs and NT itself is an art. Nagar sorts through the mechanics...
PC Magazine Windows XP Solutions
PC Magazine Windows XP Solutions
You wanted more Windows XP solutions.
Here they are

PC Magazine's Neil Randall heard you when you asked for more about Windows XP security, fighting spy- ware, and surviving a crash. This second edition includes more than 100 pages of new information about protecting your system, preventing problems, and rescuing data if something...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy