|
|
|
|
|
Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... | | Secure Key Establishment (Advances in Information Security)Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.
Secure Key Establishment identifies several variants of the key sharing requirement. Several variants... | | SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... |
|
Anti-Hacker Tool Kit, Third EditionTHWART THE LATEST DISASTROUS ATTACKS
Mount a comprehensive, proactive defense against the most sinister cyber-criminals using the tricks and techniques contained in this unique resource. Fully updated to include the latest weapons in the security experts; arsenal, Anti-Hacker Tool Kit, Third Edition provides all the... | | The Rational Unified Process: An Introduction, Third EditionThe Rational Unified Process, Third Edition, is a concise introduction to IBM's Web-enabled software engineering process. Rational Unified Process®, or RUP®, Lead Architect Philippe Kruchten quickly and clearly describes the concepts, structure, content, and motivation that are central to the RUP. Readers will... | | |
|
Wiki at War: Conflict in a Socially Networked World
In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.
WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide ... | | Cube Farm
Truth is often stranger than fiction, especially when it comes to the workplace. In Cube Farm, author Bill Blunden recounts his three years in Minnesota performing research and development for Lawson Software. Riddled with intrigue, duplicity and collusion, this story offers a trench-level view of a company in the... | | Web Hacking: Attacks and Defense"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |