CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...
Hacking Exposed Cisco Networks
Implement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways... Monitoring with Ganglia
In 1999, I packed everything I owned into my car for a cross-country trip to begin my
new job as Staff Researcher at the University of California, Berkeley Computer Science
Department. It was an optimistic time in my life and the country in general. The economy
was well into the dot-com boom and still a few years...
Ajax Security The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...
|Result Page: 5 4 3 2 1 |