 |
|
 Cracking Drupal: A Drop in the BucketThe first book to reveal the vulnerabilities and security issues that exist in the sites that have been built with Drupaland how to prevent them from continuing Drupal is an open source framework and content management system that allows users to create and organize content, customize presentation, automate tasks, and manage site visitors and... |  |  Design on the Edge: The Making of a High-Performance BuildingThis is the story of a small building in Ohio that was one of the first, if not the first, substantially green or high-performance buildings on a college campus. It spans the decade between 1995 and 2005. In that time, Americans impeached a president, balanced the federal budget and then unbalanced it again, witnessed the largest corporate... |  |  Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... |
|
|
 Geekonomics: The Real Cost of Insecure SoftwareYou may or may not have an inkling of what insecure software is, how it impacts your life, or why you should be concerned. That is OK. This book attempts to introduce you to the full scope and consequence of software's impact on modern society without baffling the reader with jargon only experts understand or minutia only experts care about. The... |  |  |  |  Defense and Detection Strategies against Internet WormsThis is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,... |
|
 Practical Aspects of Interview and Interrogation-Soft CoverWhat makes a person confess to a crime he did not commit? Was he coerced? Is he trying to protect someone else? Interrogation has come under attack as opponents focus on false confessions. However, most cases are still resolved by confession, not forensic evidence. Among the new topics covered in the Second Edition of this bestselling book,... |  |  Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |  |  |
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |