Advanced Calculus New publisher! Corrected version! Demonstrating analytical and numerical techniques for attacking problems in the application of mathematics, this well-organized, clearly written text presents the logical relationship and fundamental notations of analysis. Buck discusses analysis not solely as a tool, but as a subject in its own right. This... The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...
Security in Sensor Networks
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.
Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,...
SONET/SDH Demystified *Clear explanations of SONET (Synchronous Optical Network), the industry standard for high speed transmission over optical fiber, for the non-engineer *Provides detailed SONET case studies and business models *Includes coverage of DWDM (Dense Wavelength Division Multiplexing) and WDM (Wavelength Division Multiplexing
The year was 1984,...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks.... Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
|Result Page: 5 4 3 2 1 |