Some software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes...
Thank you for picking up Silverlight 1.0 Unleashed! Silverlight is changing the way many people think about designing and developing websites or web applications, and this book helps you take advantage of everything Silverlight enables. Silverlight makes it easier than ever to create rich web-based content or applications. And given that it’s...
High-performance system architectures are increasingly exploiting heterogeneity: multi- and manycore-based systems are complemented by coprocessors, accelerators, and reconfigurable units providing huge computational power. However, applications of scientific interest (e.g. in high-performance computing and numerical simulation) are not yet...
Parallel hardware has been ubiquitous for some time now. It’s difficult to find a laptop,
desktop, or server that doesn’t use a multicore processor. Beowulf clusters are
nearly as common today as high-powered workstations were during the 1990s, and
cloud computing could make distributed-memory systems as accessible as...
Amobile adhoc network, is a system of autonomous mobile terminals connected by wireless links. Being independent of any infrastructure, these networks have the ability to be deployed easily, fast and cost efficient. The objective of this thesis is to exploit the advantages of the application of Code Division Multiple Access (CDMA) in the lower...
Phishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with...
The first edition of Object Technology: A Manager's Guide is widely viewed as the classic introduction to this powerful computing concept. Object technology offers increased agility, significant time-to-market reduction, and the opportunity to exploit the potential of the World Wide Web by deploying globally distributed...
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...
Few topics in the information technology (IT) field today generate as much interest as security. Interestingly, the IT world has been struggling with security issues for over 30 years, yet many security problems remain unsolved, unaddressed, and serious. As those responsible for securing systems and networks address security issues...