As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...
When I first became aware of Adrian Neagu's intent to author a book on Oracle security, I sent
him a congratulatory note. This is an important subject area, and I felt a special need to pass
on my best wishes. His first book IBM DB2 9.7 Advanced Administration Cookbook, Packt
Publishing, had a chapter devoted to database...
In the time of Duke Huan of Ch’i [the position of] the son of Heaven had
become humble and weak, while the feudal lords used their energies in attacking
[one another]. The Southern Yi and Northern Ti engaged the Central
States in battle, and the continued existence of the Central States seemed [to
hang by] a thin thread...
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
This book is an anthology of effective database management techniques representing the collective wisdom of the OakTable Network. With an emphasis upon performance—but also branching into security, national language, and other issues—the book helps you deliver the most value for your company’s investment in Oracle Database...
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...
One has only to read a newspaper or magazine to realize the importance of
energy at this early juncture of the 21st century. It will surely become more
critical as world demand for oil continues to increase and its supply peaks
and begins to fall.
Industrialized nations have become addicted to an ever-increasing...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and...