 |
|
|
|
|
 Absolute OpenBSD: UNIX for the Practical Paranoid
This book takes readers through the intricacies of the OpenBSD platform, and teaches them how to manage the system with friendly explanations, background information, troubleshooting suggestions, and copious examples.
This straightforward, practical, and complete guide to mastering the powerful and complex OpenBSD operating system,... |  |  Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... |  |  CISSP: Certified Information Systems Security Professional Study GuideHere's the book you need to prepare for the CISSP exam from (ISC)2. Written by a team of experienced security experts who know exactly what it takes to pass the test, this Study Guide provides:
Assessment testing to focus and direct your studies In-depth coverage of official test domains Hundreds of challenging practice questions, in the book... |
|
 Securing SQL Server, Second Edition: Protecting Your Database from Attackers
Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names... |  |  Snort 2.1 Intrusion Detection, Second Edition
Snort, Information Security Magazine’s pick for Open Source Product of the year 2003, is one of the best examples of the IT community working together to build a capability. Please notice I did not say a tool, but rather, a capability. Snort’s extensible architecture and open source distribution has long made it an ideal choice... |  |  |
|
 Disaster Recovery (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Virtual Honeypots: From Botnet Tracking to Intrusion DetectionHoneypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and... |  |  Sams Teach Yourself Linux Security Basics in 24 HoursThis book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |