 |
|
 |  |  Geekonomics: The Real Cost of Insecure SoftwareYou may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The... |  |  |
|
 Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... |  |  Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... |  |  |
|
 Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |  |  Medical Response to Terrorism: Preparedness and Clinical PracticeEven two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security, ... |  |  |
|
 InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... |  |  Ethics for CPAs: Meeting Expectations in Challenging TimesAccountants are under attack. Recent investigations of Enron, Global Crossing, WorldCom, and Adelphia, just to name a few, along with the remarkable collapse of Arthur Andersen, have focused the nation’s attention on the accounting profession and the need for reforms. All parties agree that accounting firms must change their priorities and... |  |  Defending the Digital Frontier: A Security AgendaPraise for Defending the Digital Frontier
"The charge of securing corporate America falls upon its business leaders. This book, offered by Ernst & Young and written by Mark Doll, Sajay Rai, and Jose Granado, is not only timely, but comprehensive in outlook and broad in scope. It addresses many of the critical security... |
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 |