|
|
|
|
Honeypots: Tracking Hackers"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture... | | Caution! Wireless Networking: Preventing a Data DisasterSure you’re vulnerable. Now here’s what you do about it
Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard... | | Joomla! Web SecurityIn Detail
Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,... |
|
|
Anti-Hacker Tool Kit, Second EditionStop hackers in their tracks using the tools and techniques described in this unique resource. Organized by category, Anti-Hacker Tool Kit provides complete details on the latest and most critical security tools, explains their function, and demonstrates how to configure them to get the best results. New and updated case studies... | | The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in... | | What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be
protected by security guards, cipher locks, and an ID badge worn by all
employees. As the computing paradigm is continually changing with shared
resources and mobility, firewalls and antivirus software are also not enough
to protect critical assets. This... |
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |