|
|
|
|
Defeating the Hacker: A non-technical guide to computer securityThis is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage... | | | | The Shellcoder's Handbook: Discovering and Exploiting Security HolesThe black hats have kept up with security enhancements. Have you?
In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution... |
|
Understanding the Linux Kernel (2nd Edition)In the spring semester of 1997, we taught a course on operating systems based on Linux 2.0. The idea was to encourage students to read the source code. To achieve this, we assigned term projects consisting of making changes to the kernel and performing tests on the modified version. We also wrote course notes... | | Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... | | Ruby Wizardry: An Introduction to Programming for Kids
The Ruby programming language is perfect for beginners: easy to learn, powerful, and fun to use! But wouldn't it be more fun if you were learning with the help of some wizards and dragons?
Ruby Wizardry is a playful, illustrated tale that will teach you how to program in Ruby by taking you on a fantastical... |
|
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |