 |
|
|
 Wikipedia: The Missing ManualWhat made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the... |  |  OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |  |  CISA Certified Information Systems Auditor Study GuideTake charge of your career with CISA certification
Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS... |
|
|
 AVIEN Malware Defense Guide for the EnterpriseMembers of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected... |  |  Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |  |  Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery PlansA complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors
This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect... |
|
Result Page: 5 4 3 2 1 |