Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were
involved in some of the fi rst penetration tests performed in the UK, where large organizations and
government departments allowed ethical hackers into their networks to determine the risk they
faced from what are now known as cyber attacks.... Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
Advanced Calculus New publisher! Corrected version! Demonstrating analytical and numerical techniques for attacking problems in the application of mathematics, this well-organized, clearly written text presents the logical relationship and fundamental notations of analysis. Buck discusses analysis not solely as a tool, but as a subject in its own right. This...
Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
Write your own custom information security tools using Perl and object-oriented Perl modules
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
Information Warfare and Organizational Decision-Making Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...
REPOSITIONING: Marketing in an Era of Competition, Change and Crisis
The book that completes Positioning . . .
Thirty years ago, Jack Trout and Al Ries published their classic bestseller, Positioning: The Battle for Your Mind—a book that revolutionized the world of marketing. But times have changed. Competition is fiercer. Consumers are savvier. Communications are...
Protected: Internet, Intranet, & Virtual Private Networks A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web...
|Result Page: 6 5 4 3 2 1 |