|
|
Beginning JBoss® Seam: From Novice to ProfessionalReacting to the popularity of J2EE™ alternatives such as Ruby on Rails and the enterprise Spring Framework, Red Hat JBoss®, Inc. developed JBoss® Seam, a new open source lightweight Java™ EE 5-based contextual application development framework. Beginning JBoss® Seam: From Novice to Professional gets you started as... | | InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... | | Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... |
|
| | Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... | | Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... |
|
Linux For Dummies 8th EditionEverything you need to install, run, and optimize Linux on your desktop
Here's how to start using Linux, the popular and free operating system
Want to do the same tasks you can with Windows, except for free? Linux is the alternative open source operating system that's beloved by users... | | The Oracle Hacker's Handbook: Hacking and Defending Oracle
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |
|
Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... | | Hacking For Dummies (Computer/Tech)Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of... | | Developer's Guide to Web Application SecurityOver 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
This book defines Web application security, why it should be... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 |