 |
|
|
 Preventing Web Attacks with ApacheThe only end-to-end guide to securing Apache Web servers and Web applications
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications.... |  |  Security WarriorThis book offers unique methods for honing your information security (infosec) technique. The typical reader is an intermediate- to advanced-level practitioner. But who among us is typical? Each of us approaches infosec with distinctive training and skill. Still, before you spend your hard-earned money on this book, we will... |  |  MySQL CookbookThe MySQL database management system has become quite popular in recent years. This has been true especially in the Linux and open source communities, but MySQL's presence in the commercial sector now is increasing as well. It is well liked for several reasons: MySQL is fast, and it's easy to set up, use, and administrate. MySQL... |
|
 Aggressive Network Self-DefenseI'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
... |  |  Black Hat Physical Device Security: Exploiting Hardware and SoftwareAttacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,... |  |  Penetration Tester's Open Source ToolkitThis is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost... |
|
 Multimedia Security HandbookIntellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection... |  |  Oracle Application Server 10g: J2EE Deployment and AdministrationIdeal for anyone wanting to stay ahead in the world of Oracle’s application servers, this focused, no-frills guide will help you get J2EE applications up and running on 10g.
Oracle Application Server 10g: J2EE Deployment and Administration focuses on the latest version of Oracle's fully J2EE-certified... |  |  Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |
|
Result Page: 6 5 4 3 2 1 |