 |
|
 Learning Linux Binary Analysis
Key Features
-
Grasp the intricacies of the ELF binary format of UNIX and Linux
-
Design tools for reverse engineering and binary forensic analysis
-
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Book Description
Learning... |  |  Network Attacks and Defenses: A Hands-on Approach
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both... |  |  The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security... |
|
 The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... |  |  Hardening Azure Applications
Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform.
This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability... |  |  Hyper-V Security
If you are an administrator with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory, but you're looking for more information on hardening your Hyper-V deployment, this book is for you. If you've already got a functional Hyper-V environment, you will have no trouble reading this book and following its... |
|
|
 Fault Analysis in Cryptography (Information Security and Cryptography)
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic... |  |  Computer Security for the Home and Small Office
Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.
The book offers... |  |  Otosclerosis And Stapes Surgery (Advances in Oto-Rhino-Laryngology)
Otosclerosis is a disorder causing a hardening of the middle ear bones which leads to a progressive hearing loss. Internationally renowned experts met in Saas Fee (Switzerland) in 2004 to discuss otosclerosis and stapes surgery, and they have subsequently been invited by the editor to present their findings in this publication. From basic to... |
|
| Result Page: 6 5 4 3 2 1 |