Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protect Your Information With Intrusion Detection (Power)
Protect Your Information With Intrusion Detection (Power)

Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an...

Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)
Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition)

It's hard to remember a world without the Internet. We now take for granted that we can access our bank accounts and health records, get driving directions, talk to friends, and shop, all on the Internet. Many companies couldn't survive without it because it is their link to their customers.

But the...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Security Warrior
Security Warrior

This book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will...

Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
Foundations of Cryptography: A Primer (Foundations and Trends in Theoretical Computer Science,)
The vast expansion and rigorous treatment of cryptography is one of the major achievements of theoretical computer science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced, classical notions such as secure encryption and unforgeable signatures were placed on...
Simple Computer Security: Disinfect Your PC
Simple Computer Security: Disinfect Your PC
This book discusses the primary issues and threats that face all computer and Internet users. Not only does it describe the symptoms, prevalence, and affects of the most common computer security problems, it also provides simple solutions so you and your family will have a safe and pleasant online and computing experience....
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

Oracle Application Server 10g: J2EE Deployment and Administration
Oracle Application Server 10g: J2EE Deployment and Administration

Ideal for anyone wanting to stay ahead in the world of Oracle’s application servers, this focused, no-frills guide will help you get J2EE applications up and running on 10g.


Oracle Application Server 10g: J2EE Deployment and Administration focuses on the latest version of Oracle's fully J2EE-certified...

Roots and Collapse of Empathy: Human nature at its best and at its worst (Advances in Consciousness Research)
Roots and Collapse of Empathy: Human nature at its best and at its worst (Advances in Consciousness Research)

Spanning from care-giving infants and civilian rescuers risking their life to the collapse of empathy in agents of torture and extinction, this unique book deals with and illustrates the altruistic best and atrocious worst of human nature. It begins with infant roots of empathy, then turns to the neurosocial support of empathic participation,...

Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy