Home | Amazing | Today | Tags | Publishers | Years | Search 
Defend I.T. : Security by Example
Defend I.T. : Security by Example

The battle between IT professionals and those who use the Internet for destructive purposes is raging-and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to...

Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes...
JNCIE: Juniper Networks Certified Internet Expert Study Guide
JNCIE: Juniper Networks Certified Internet Expert Study Guide
Greetings and welcome to the world of Juniper Networks. This introductory section serves
as a location to pass on to you some pertinent information concerning the Juniper Networks
Technical Certification Program. In addition, you’ll find information about how the book itself
is laid out and what it contains. Finally,
...
Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
E-Business, E-Government & Small and Medium Size Enterprises: Opportunities & Challenges
E-Business, E-Government & Small and Medium Size Enterprises: Opportunities & Challenges

Much of the e-commerce and IT research in small and medium sized enterprises (SME) indicates that these smaller businesses are lagging behind in implementing technological advances. This raises concerns for these SME's success as the Information Age becomes ever more of a reality. e-Business, e-Government & Small and Medium-Size...

CCSP SECUR Exam Cram 2 (642-501)
CCSP SECUR Exam Cram 2 (642-501)

Exam Cram 2 fills the needs of 1,000s of Certified Security Specialists and new security cert candidates looking to upgrade to a CCSP.

  • SECUR is the first and most important of the 5 required exams to obtain a CCSP.

  • ...
Managing Information Security Risks: The OCTAVE Approach
Managing Information Security Risks: The OCTAVE Approach

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...

JNCIP: Juniper Networks Certified Internet Professional Study Guide
JNCIP: Juniper Networks Certified Internet Professional Study Guide

Here’s the book you need to prepare for the hands-on JNCIP exam, CERT-JNCIP-M, from Juniper Networks. Written by the Juniper Networks trainer who helped develop the exam, this Study Guide provides the information and insights you need to approach the challenging JNCIP hands-on lab exam with confidence.

Authoritative coverage of all...

Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Essentials of Managing Corporate Cash
Essentials of Managing Corporate Cash
Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this handy and concise book will help you stay up to date on the newest thinking, strategies and technologies in managing corporate cash.

Full of valuable tips, techniques, illustrative real-world examples, exhibits, and best practices, this...

Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles &...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy