Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings
These are the proceedings of CHES 2004, the 6th Workshop on Cryptographic
Hardware and Embedded Systems. For the first time, the CHES Workshop was
sponsored by the International Association for Cryptologic Research (IACR).
This year, the number of submissions reached a new record. One hundred
and twenty-five papers were
...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry...
Sleeping with the Enemy: Running Windows® on a Mac®
Sleeping with the Enemy: Running Windows® on a Mac®

Sleeping with the Enemy: Running Windows on a Mac provides the information Mac users need to understand the options for running Windows on a Mac and to choose the best fit for them. It includes detailed information on installing, configuring, and using both kinds of Windows environments. Important...

Designing Visual Interfaces: Communication Oriented Techniques
Designing Visual Interfaces: Communication Oriented Techniques
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Cuckoo Malware Analysis
Cuckoo Malware Analysis

Analyze malware using Cuckoo Sandbox

Overview

  • Learn how to analyze malware in a straightforward way with minimum technical skills
  • Understand the risk of the rise of document-based malware
  • Enhance your malware analysis concepts through illustrations, tips and tricks,...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy