Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Quantifying and Controlling Catastrophic Risks
Quantifying and Controlling Catastrophic Risks
The perception, assessment and management of risk are increasingly important core principles for determining the development of both policy and strategic responses to civil and environmental catastrophes. Whereas these principles were once confined to some areas of activity i.e. financial and insurance, they are now widely used in civil and...
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Expert Oracle Practices: Oracle Database Administration from the Oak Table
Expert Oracle Practices: Oracle Database Administration from the Oak Table

This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performance—but also branching into security, national language, and other issues—the book helps you deliver the most value for your company’s investment in Oracle Database...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure....
Encyclopedia of Data Warehousing and Mining
Encyclopedia of Data Warehousing and Mining
How can a data-flooded manager get out of the “mire”? How can a confused decision maker pass through a “maze”?
How can an over-burdened problem solver clean up a “mess”? How can an exhausted scientist decipher a “myth”?
The answer is an interdisciplinary subject and a powerful tool known as
...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy