Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...
Nokia Smartphone Hacks Nokia's smartphones pack a powerful computer into a very small space. Unlike your desktop or laptop, your smallest computer can be connected to the Internet all the time, and can interact with the world around it through its camera, voice recognition, and its traditional phone keypad. Nokia smartphones combine these features with impressive storage... Developer's Guide to Web Application Security Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be...
Effective Unit Testing: A guide for Java developers
Effective Unit Testing is written to show how to write good tests—tests that are concise and to the point, expressive, useful, and maintainable. Inspired by Roy Osherove's bestselling The Art of Unit Testing, this book focuses on tools and practices specific to the Java world. It...
eBay Hacks: 100 Industrial-Strength Tips and Tools, First Edition Whether you're a newcomer or longtime user, eBay Hacks will teach you to become efficient as both a buyer and seller. You'll find a wide range of topics, from monitoring the bidding process, getting refunds, and fixing photos so that sale items look their best, to in-depth tips for running a business on eBay and... Using Moodle: Teaching with the Popular Open Source Course Management System Developed by an extremely active open source community, Moodle is a sophisticated course management system that's ideal for creating dynamic online learning communities
and for supplementing face-to-face learning. Used in more than 115 countries and supporting over 60 languages, Moodle can scale from a single-teacher site to a 40,000-
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:
- Shows you how to speed it up, lock it down, or pull back the curtains.
- Dives into default system settings,...
|Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |