 |
|
|
|
|
 |  |  |  |  Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... |
|
 Mastering Kali Linux for Advanced Penetration Testing
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers
About This Book
-
Conduct realistic and effective security tests on your network
-
Demonstrate how key data systems are stealthily exploited, and learn how to...
|  |  Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |  |  Hiding in Plain Sight: Steganography and the Art of Covert CommunicationYour hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted... |
|
 Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |  |  Soft Landing: Airline Industry Strategy, Service, and Safety
Soft Landing: Airline Industry Strategy, Service, and Safety covers the immediate past, present, and future of the airline industry and its effects on consumers and the economy.
Aviation receives a disproportionate amount of news coverage in the popular press—not to mention chatter at cocktail parties and... |
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 |