Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Advanced Java Networking
Advanced Java Networking
Advanced Java Networking gives the reader a well-rounded and fairly detailed introduction to Java networking technologies. The subjects Sridharan covers sound like a seminar list from a software development conference: IDL/CORBA, RMI, JDBC/SQL, JavaBeans, Castanet, JMAPI, servlets, and JavaOS, to name a few. But this isn't a dilettantish...
Building Resilient IP Networks (Cisco Press Networking Technology)
Building Resilient IP Networks (Cisco Press Networking Technology)

The practical guide to building resilient and highly available IP networks

  • An all-in-one introduction to the various new features and developments in building a resilient IP network

  • A singular source on what Cisco hardware, software...

Bitter EJB
Bitter EJB
After taking a ten-year break from writing books, Bruce Tate returned to publishing in 2002 with the bestseller, Bitter Java. In Bitter Java, he introduced the concept of antipatterns, which he defined simply as common programming problems that trap software...
MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Where the Germs Are: A Scientific Safari
Where the Germs Are: A Scientific Safari
"'Dirty! Don't touch! Yuck! Feh! You don't know where it's been!' These admonitions ring in our ears-for some of us our earliest memories of parental exhortation, for others the indelible mark of our deepest fears. Germs, as we know, are everywhere, lying in wait to attack the inadequately vigilant or insufficiently armed, gangs of serial...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Hypertension: Methods and Protocols (Methods in Molecular Medicine)
Hypertension: Methods and Protocols (Methods in Molecular Medicine)

A collection of new and essential molecular techniques for cardiovascular research. These readily reproducible methods range widely from producing congenic, consomic, transgenic, and knockout models of hypertension to the gene transfer of specific genetic material using nonviral (polymers, liposomes, and antisense agents) and adenoviral...

Security for Software Engineers
Security for Software Engineers

Security for Software Engineers is designed to introduce security concepts to undergraduate software engineering students. The book is divided into four units, each targeting activities that a software engineer will likely be involved in within industry.

The book explores the key areas of attack...

Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
Nessus, Snort, & Ethereal Power Tools : Customizing Open Source Security Applications (Jay Beale's Open Source Security)
One of the most attractive attributes of Nessus is the simplicity of creating custom extensions (or
plugins) to be run with the Nessus engine.This benefit is gained via the specialized language
NASL (Nessus Attack Scripting Language). NASL supplies the infrastructure to write networkbased
scripts without the need to implement the
...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy