|
|
|
|
Securing VoIP Networks: Threats, Vulnerabilities, and CountermeasuresCommunication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony... | | Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be... | | Cryptanalysis of RSA and Its Variants
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its... |
|
|
Network Security Assessment: Know Your NetworkHow secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this... | | Chess For DummiesIt was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real... | | Design on the Edge: The Making of a High-Performance BuildingThis is the story of a small building in Ohio that was one of the first, if not the first, substantially green or high-performance buildings on a college campus. It spans the decade between 1995 and 2005. In that time, Americans impeached a president, balanced the federal budget and then unbalanced it again, witnessed the largest corporate... |
|
Linux Network Security (Administrator's Advantage Series)Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security... | | Controlling Cholesterol For Dummies (Health & Fitness)
"the authors...know their stuff...the book is a fairly painless way to learn more about subjects you might rather avoid." -- Chicago Tribune, December 1, 2002
Need to get your cholesterol in check? You’ll find the latest information about cholesterol, including treatments, drug information, and... | | Email Security with Cisco IronPort (Networking Technology: Security)
The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment... |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 |