|
|
|
|
|
Windows Vista Security: Securing Vista Against Malicious AttacksIt's not the computer. The hacker's first target is YOU!
A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and... | | Online! The BookAre you getting the best of the Internet? No way! The Web's packed with great sites you haven't discovered. Great tools you haven't tried. Great stuff you haven't done.
But that's about to change!
You're looking at an amazing collection of today's coolest Web stuff. Hundreds of incredible ideas, tips, techniques, and sites...all... | | Hacking Mac OS X Tiger : Serious Hacks, Mods and CustomizationsThis serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
|
|
|
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect... | | Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... | | Security Technologies for the World Wide Web, Second EditionThis newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as... |
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |