|
|
|
|
| | Professional Penetration Testing: Creating and Operating a Formal Hacking LabSave yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!
Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a... | | PC Magazine Linux SolutionsSo you've decided to find out about Linux.
Who better to fill you in than PC Magazine?
If you can imagine something you'd like your computer to do, you can probably do it with versatile, economical, powerful Linux. Here's how to tap that power, from installation to Linux desktop environments... |
|
|
Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... | | Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... | | |
|
The Secure Online Business: E-Commerce, It Functionality & Business ContinuityThe effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.
This... | | The Best of 2600: A Hacker Odyssey" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier." —John Baichtal (Wired Blog, August, 2008)
"...a testament to a culture which thrived before computers and the internet mattered to most of... | | The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |