|
|
|
|
Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... | | Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great... | | |
|
|
HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... | | Security in Computing Systems: Challenges, Approaches and Solutions
This monograph on Security in Computing Systems: Challenges, Approaches and
Solutions aims at introducing, surveying and assessing the fundamentals of secu
rity with respect to computing. Here, “computing” refers to all activities which
individuals or groups directly or indirectly perform by means of computing sys
tems,... | | Information Warfare and Organizational Decision-MakingOrganizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... |
|
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 45 |