 |
|
 Free as in Freedom: Richard Stallman's Crusade for Free SoftwareIn 1984, Richard Stallman launched the GNU Project for the purpose of developing a complete UNIX-like operating system that would allow for free software use. What he developed was the GNU operating system. (GNU is a recursive acronym for "GNU's Not UNIX,'' and it is pronounced guh-NEW. Linux is a variant of the GNU operating system.) This... |  |  |  |  Hack Proofing Sun Solaris 8Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors... |
|
 Hack Proofing Your Web ApplicationsAs a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some... |  |  Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and... |  |  CD Cracking Uncovered: Protection Against Unsanctioned CD CopyingA manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver... |
|
 Linux Network Security (Administrator's Advantage Series)Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security... |  |  Network Security: A Beginner's GuideLearn network security basics using this practical guide
Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to... |  |  Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |