The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...
I remember talking in 1995 with Bob Staton, CEO of Colonial Life
& Accident Insurance Company, a division of UNUM, about the
lack of leadership throughout the company. Colonial was one of
the few large, homegrown companies in Columbia, South Carolina,
when it was acquired by UNUM, the Maine-based disability insurance...
Manufacturing Execution System - MES The classical factory fades into history as production plants today develop into modern service centers. Problems in management arise for which many companies are not yet prepared: economic efficiency of modern added value is not a property of products alone but of the process. Decisive potential in business now is a question of process capability,... Ruby Developer's Guide "Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using... The Myths of Security: What the Computer Security Industry Doesn't Want You to Know If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
|Result Page: 35 34 33 32 31 30 29 28 27 26 |