Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Defeating the Hacker: A non-technical guide to computer security
Defeating the Hacker: A non-technical guide to computer security
This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage...
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Understanding the Linux Kernel (2nd Edition)
Understanding the Linux Kernel (2nd Edition)

In the spring semester of 1997, we taught a course on operating systems based on Linux 2.0. The idea was to encourage students to read the source code. To achieve this, we assigned term projects consisting of making changes to the kernel and performing tests on the modified version. We also wrote course notes...

Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • Ruby Wizardry: An Introduction to Programming for Kids
    Ruby Wizardry: An Introduction to Programming for Kids

    The Ruby programming language is perfect for beginners: easy to learn, powerful, and fun to use! But wouldn't it be more fun if you were learning with the help of some wizards and dragons?

    Ruby Wizardry is a playful, illustrated tale that will teach you how to program in Ruby by taking you on a fantastical...

    Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
    Insider Attack and Cyber Security: Beyond the Hacker (Advances in Information Security)
    Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia...
    Wi-Foo : The Secrets of Wireless Hacking
    Wi-Foo : The Secrets of Wireless Hacking

    The definitive guide to penetrating and defending wireless networks.

    Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

    The Mezonic Agenda: Hacking the Presidency
    The Mezonic Agenda: Hacking the Presidency
    "Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
    2600: The Hacker Quarterly, Spring 2003
    2600: The Hacker Quarterly, Spring 2003
    2600: The Hacker Quarterly, Spring 2003

    2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet
    ...
    Mobile Device Security For Dummies
    Mobile Device Security For Dummies

    The information you need to avoid security threats on corporate mobile devices

    Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a...

    2600: The Hacker Quarterly, Spring 2005
    2600: The Hacker Quarterly, Spring 2005
    2600: The Hacker Quarterly, Spring 2005

    2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well
    ...
    unlimited object storage image
    Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
    ©2021 LearnIT (support@pdfchm.net) - Privacy Policy