Open Source Security Tools: Practical Guide to Security Applications, A
Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses.
Written with the harried IT manager in mind, Open Source Security Tools is a practical,...
Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion...
The Mobile Connection: The Cell Phone's Impact on Society Rich Ling provides a compelling examination of the real impact of mobile telephony. It's not about technology, it's about people. We need more of these kinds of studies.
--Don Norman, Co-Founder, Nielsen Norman Group and author of Emotional Design
This book combines scientific rigor, penetrating insight, and attention to an...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.
The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following...
Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...
Python Penetration Testing Essentials
Employ the power of Python to get the best out of pentesting
About This Book
Learn to detect and avoid various types of attacks that put the privacy of a system at risk
Employ practical approaches to penetration testing using Python to build efficient code and eventually save time...
Network Security Bible If you need a solid foundation in network security, this is it
Here at last is a comprehensive, focused guide that covers network security from applications to zip files. You'll learn network security principles and best practices, how to apply measures appropriate to various systems, how to identify and respond to an intrusion, and how...
|Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |