 |
|
|
 Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  Certified Ethical Hacker (CEH) Foundation Guide
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation... |  |  |
|
 |  |  Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpellier, France, November 12–14, 2018, Revised Selected ... (Lecture Notes in Computer Science (11389))
These proceedings contain the papers selected for presentation at the 17th Smart Card
Research and Advanced Applications Conference (CARDIS 2018), which was held in
Montpellier, France, during November 12–14, 2018, and organized by the Montpellier
Laboratory of Informatics, Robotics and Microelectronics (LIRMM). ... |  |  Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... |
|
|
Result Page: 6 5 4 3 2 1 |