|
|
|
|
|
Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | Linux Mint Essentials
A practical guide to Linux Mint for the novice to the professional
About This Book
-
Learn to use Linux Mint like a pro, starting with the installation and going all the way through maintaining your system
-
Covers everything you need to know in order to be productive, including browsing the...
| | Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... |
|
|
Practical Linux Security Cookbook
Key Features
-
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
-
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
-
Enhance file system security and local and remote
... | | Privacy Protection and Computer Forensics, Second EditionThis book deals with security from hostile computer forensics (mostly on one’s computer, but also on one’s digital camera, fax machine, and related computer-like electronics), as distinct from network forensics, which in this context is snooping into users’ online activities. Computer forensics deals with... | | Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... |
|
|
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 |