|
|
|
|
|
UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... | | Windows Vista® Resource Kit, Second EditionGet the definitive reference for deploying, configuring, and supporting Windows Vista with expert insights from Microsoft Most Valuable Professionals (MVPs) and the Windows Vista Team at Microsoft. With additions and updates for SP1, this official Microsoft RESOURCE KIT provides more than 1,700 pages of in-depth technical guidance on automating... | | Official (ISC)® Guide to the CISSP®-ISSEP® CBK®Official (ISC)2Ю Guide to the CISSP-ISSEPЮ CBKЮ provides an inclusive analysis of all of the topics covered on the newly created ISSEP Exam. The first fully comprehensive guide to the test, it promotes understanding of the four ISSEP domains. It explains ISSE by comparing it to a traditional Systems Engineering model,... |
|
|
Windows Vista Security: Securing Vista Against Malicious AttacksIt's not the computer. The hacker's first target is YOU!
A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and... | | The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... | | Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |