 |
|
|
|
|
 Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |  |  Wicked Cool PHP: Real-World Scripts That Solve Difficult ProblemsPHP is an easy-to-use scripting language perfect for quickly creating the Web features you need. Once you know the basics of how the language works, wouldn't it be great to have a collection of useful scripts that solve those tricky problems and add interesting functionality to your site? We thought so, too.
Instead of starting at "Hello... |  |  Information Warfare: How to Survive Cyber Attacks"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust... |
|
|
 Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.
A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers... |  |  Security Awareness: Applying Practical Security in Your World
For most students and computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? SECURITY AWARENESS:... |  |  Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking... |
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 |