|
|
|
|
Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... | | Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... | | UNIX and Linux Forensic Analysis DVD ToolkitThe only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account... |
|
Official Red Hat Linux User's GuideRed Hat sealed and approved! Compiled by Red Hat’s own documentation team and reviewed by a Red Hat qualified technical expert, this comprehensive, authoritative guide delivers all the know-how you need to install, use, and customize the latest version of Red Hat Linux.
From identifying system requirements to configuring a network,... | | Maximum Security, Fourth EditionMaximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in... | | Machine Learning for Hackers
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract insight
from a record of the... |
|
|
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and... | | Webster's New World Hacker DictionaryThe comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace.
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital... | | Developer's Guide to Web Application SecurityOver 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be... |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |