Penetration Testing Bootcamp
Get practical demonstrations with in-depth explanations of complex security-related problems
Familiarize yourself with the most common web vulnerabilities
Get step-by-step guidance on managing testing results and reporting
Wireless Security Handbook This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this...
The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions
Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...
|Result Page: 49 48 47 46 45 44 43 42 41 40 |