 |
|
|
 Windows Vista Security: Securing Vista Against Malicious AttacksIt's not the computer. The hacker's first target is YOU!
A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and... |  |  Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |  |  IT Compliance and Controls: Best Practices for ImplementationPraise for IT Compliance and Controls
"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen." —Dr. Richard Reiner, founder,... |
|
 IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... |  |  Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... |  |  Auditing Cloud Computing: A Security and Privacy Guide
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment
Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just... |
|
 SQL Injection Attacks and DefenseSQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known... |  |  Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fastZimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy... |  |  Penetration Testing Bootcamp
Key Features
-
Get practical demonstrations with in-depth explanations of complex security-related problems
-
Familiarize yourself with the most common web vulnerabilities
-
Get step-by-step guidance on managing testing results and reporting
Book Description
... |
|
Result Page: 3 2 1 |