 |
|
|
 Computers Under Attack: Intruders, Worms and Viruses
This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The... |  |  Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |  |  Warfare and Weaponry in Dynastic Egypt
Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as... |
|
 Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement... |  |  Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
-
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
-
Become an expert in cracking WiFi...
|  |  Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server... |
|
 Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)
Recognized experts comprehensively review the clinical, surgical, radiological, and scientific aspects of atherosclerotic peripheral arterial disease (PAD), including endovascular, gene, and drug therapies. In their far-ranging discussions, the authors examine in depth the risk factors and antiplatelet therapies for PAD patients at high risk... |  |  Use of Force: A Thriller (The Scot Harvath Series)
“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy
From #1 New York Times bestselling author Brad Thor.
As a storm rages across the Mediterranean Sea, a... |  |  The Lost Boyz: A Dark Side of Graffiti
At age 14, author Justin Rollins went from being a bullied child to the leader of The Warriorz, a group of London street kids involved in graffiti tagging and other crimes, including a series of violent encounters. Eventually given a substantial custodial sentence for an attack with a meat cleaver in the London Underground, Rollins became... |
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |