|
|
|
|
|
Hacking Wireless Networks For Dummies (Computer/Tech)Become a cyber-hero — know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." —Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient — not... | | Automating Windows With PerlPerl is the perfect language for achieving Automation in Windows because it combines a painless Visual Basic style of coding with Perl's strength as a scripting language for process communications. The new multitasking and networking approaches with 32-bit Windows require a radical departure from previous programming techniques. This book,... | | Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is... |
|
|
Anti-Hacker Tool Kit, Third EditionTHWART THE LATEST DISASTROUS ATTACKS
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the... | | Information Assurance ArchitectureSafeguard Your Organization’s Information!
Now that information has become the lifeblood of your organization, you must be especially vigilant about assuring it. The hacker, spy, or cyber-thief of today can breach any barrier if it remains unchanged long enough or has even the tiniest leak. In Information... | | The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |