|
|
|
|
Security MonitoringHow well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic... | | Absolute OpenBSD: UNIX for the Practical Paranoid
This book takes readers through the intricacies of the OpenBSD platform, and teaches them how to manage the system with friendly explanations, background information, troubleshooting suggestions, and copious examples.
This straightforward, practical, and complete guide to mastering the powerful and complex OpenBSD operating system,... | | Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... |
|
Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... | | CISSP: Certified Information Systems Security Professional Study GuideHere's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book... | | Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names... |
|
|
Virtual Honeypots: From Botnet Tracking to Intrusion DetectionHoneypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and... | | Sams Teach Yourself Linux Security Basics in 24 HoursThis book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included... | | Java Security (Java Series)
Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |