Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
CISA Exam Prep: Certified Information Systems Auditor (ACM Press)
The CISA Exam Prep provides you with the market's most comprehensive and current material for passing the new CISA certification exam. Exam Prep's best-selling study methods feature chapter review questions, practice exams, exam alerts, notes, tips, and cautions. You'll also have exclusive access to online test...
Windows Vista Security: Securing Vista Against Malicious Attacks
Windows Vista Security: Securing Vista Against Malicious Attacks

It's not the computer. The hacker's first target is YOU!

A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and...

Computer Viruses For Dummies
Computer Viruses For Dummies

Build up your defenses against online germ warfare

Discover how viruses work and how to outsmart the cyber-thugs who create them

Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

Take charge of your career with CISA certification

Prepare for CISA certification and improve your job skills with the training you'll receive in this valuable book. Covering the very latest version of the exam, it's packed with instruction on all exam content areas, including the most up-to-date regulations, IS...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Information Technology Control and Audit, Third Edition
Information Technology Control and Audit, Third Edition
The book is very useful for beginners as well as practitioners …well written and presented. ... should provide resiliency to IT security in the emerging cyberworld.
Information Systems Control Journal

Now in its third edition, this book is an excellent introductory
...
CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

CISA Certified Information Systems Auditor Study Guide
CISA Certified Information Systems Auditor Study Guide

The industry-leading study guide for the CISA exam, fully updated

More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as the top certification for security professionals. Compliances, regulations, and best practices for IS auditing are updated...

Governance of the Extended Enterprise: Bridging Business and IT Strategies
Governance of the Extended Enterprise: Bridging Business and IT Strategies
Discover how to implement an effective IT governance structure for the long-term success of an extended enterprise

IT is no longer an enabler of corporate strategy, it is now the key element of corporate strategy. Governance of the Extended Enterprise explores how some of the world's most successful enterprises have integrated information...

unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy