 |
|
|
 Network Analysis Using Wireshark Cookbook
This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues.
Overview
-
Place Wireshark in your network and configure it for...
|  |  Managing Trust in Cyberspace
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis... |  |  Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
-
Recipes designed to educate you extensively on the penetration testing principles and Kali...
|
|
|
 Guide to Tactical Perimeter Defense
This course is the official courseware for the Security Certified Program SC0-451
certification exam. The Tactical Perimeter Defense course is designed to provide
network administrators and certification candidates with hands-on tasks on the
most fundamental perimeter security technologies. The network perimeter is often
the first... |  |  Computer Crime, Investigation, and the Law
One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously,... |  |  Advanced Statistical Steganalysis (Information Security and Cryptography)
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical... |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |