Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Managing Cisco Network Security
Managing Cisco Network Security
Information security has become an extremely important topic for everyone over the past few years. In today’s environment the number of touch points between an organization’s information assets and the outside world has drastically increased: millions of customers can interact via a Web site, thousands of employees and partners may...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

CCNP Security IPS 642-627 Official Cert Guide
CCNP Security IPS 642-627 Official Cert Guide

Learn, prepare, and practice for exam success

 

CCNP Security IPS 642-627 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security IPS exam. Senior security engineers David Burns,...

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Wi-Foo : The Secrets of Wireless Hacking
Wi-Foo : The Secrets of Wireless Hacking

The definitive guide to penetrating and defending wireless networks.

Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any...

CCSP: Securing Cisco IOS Networks Study Guide (642-501)
CCSP: Securing Cisco IOS Networks Study Guide (642-501)
Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides:
  • In-depth coverage of every SECUR exam objective
  • Practical information on Cisco security solutions
  • Hundreds of challenging practice...
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card Research and Advanced Applications Conference (CARDIS 2018), which was held in Montpellier, France, during November 12–14, 2018, and organized by the Montpellier Laboratory of Informatics, Robotics and Microelectronics (LIRMM)....
Security Log Management: Identifying Patterns in the Chaos
Security Log Management: Identifying Patterns in the Chaos
Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only
...
Network Defense: Perimeter Defense Mechanisms
Network Defense: Perimeter Defense Mechanisms

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy