Hack Attacks Testing: How to Conduct Your Own Security Audit Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...
Maximum Mac OS X Security
While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.
Yet most Mac OS X books are generally...
IBM Cognos 8 Report Studio Cookbook
Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences,...
Hacking Exposed Wireless
Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...
The Encyclopedia of Animated Cartoons In the beginning (this was the 1960s for me), Saturday mornings existed for the sole purpose of watching cartoons. Before my brother and I were allowed to turn on the TV the only rule was that our beds had to be made, our breakfast eaten (Quisp! cereal) and our teeth brushed. Of course, we were up at the crack of dawn so as to not miss a thing.... Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Recipes designed to educate you extensively on the penetration testing principles and Kali...
|Result Page: 7 6 5 4 3 2 1 |