 |
|
 WordPress 3 Ultimate Security
Most likely, today, some hacker tried to crack your WordPress site, its data and
content. Maybe that was just a one-off from some bored kid. Just as likely, it was an
automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it
was both.
Whether you've been successfully hacked already, else... |  |  Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  PHPList 2 E-mail Campaign Manager
Tired of an e-mail BCC list that scrolls off the page or fiddly and hard-to-manage bulk mailing systems? You need phpList—a high-powered, robust, feature-packed mailing system that will "get out of your way" and get the job done.
phpList 2 E-mail Campaign Manager will guide you from basic installation and setup... |
|
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Risk Management Solutions for Sarbanes-Oxley Section 404 IT Compliance
This book is about expanding Internet business risk management strategies
into resilience such as software diversity; into financial risk transfer instruments
such as insurance policies, catastrophe bonds, performance bonds, and
self-insurance as in Basel II; and into reputation systems.
Traditional Internet performance and... |
|
 Making, Breaking Codes: Introduction to Cryptology
This book is an introduction to modern ideas in cryptology and how to employ
these ideas. It includes the relevant material on number theory, probability, and
abstract algebra, in addition to descriptions of ideas about algorithms and com
plexity theory. Three somewhat different terms appear in the discussion of secure
communications... |  |  Managed Code Rootkits: Hooking into Runtime Environments
We live in a world in which we can’t trust our computers. For example, how can we
know for sure that our hardware manufacturer did not hide malicious code in the
system’s microchip? Or that our freshly installed operating system does not contain
backdoors created by a rogue developer from the OS development team?
... |  |  Securing the Cloud: Cloud Computer Security Techniques and Tactics
This book will prove to be a practical resource for anyone who is considering
using, building, or securing a cloud implementation. Security professionals may
refer to this book as a source of detailed information for evaluating and verifying
cloud security policy and requirements. Cloud infrastructure engineers, cloud services... |
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |