Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Microsoft SQL Server 2008 Reporting Services Unleashed
Microsoft SQL Server 2008 Reporting Services Unleashed

The authoritative, example-rich guide to Microsoft’s powerful reporting platform

With Microsoft SQL Server 2008 Reporting Services you can quickly deliver relevant business intelligence data wherever it’s needed–across the entire enterprise, and through the entire reporting lifecycle. SQL...

Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation
Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation

Maximum Linux Security: A Hacker's Guide to Protecting Your Linux Server and Workstation is designed for system administrators, managers, or Linux users who wish to protect their Linux servers and workstations from unauthorized intrusions and other external threats to their systems' integrity. Written by an experienced hacker--someone...

Digital Evidence and Computer Crime, Second Edition
Digital Evidence and Computer Crime, Second Edition

Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.

Though an...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (Advances in Information Security)
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wireless sensor node or MANET devices need to know the network's location or its relative location, with respect to the rest of the network neighbors. However, due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions....
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Microsoft  Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant
Microsoft Internet Security and Acceleration (ISA) Server 2004 Administrator's Pocket Consultant

Delivering immediate answers for the day-to-day administration of ISA Server 2004, this guide offers the focused, straightforward information you need to solve problems and get the job done.

Portable and precise, this pocket-sized guide delivers immediate answers for the day-to-day administration of ISA...

Learning Selenium Testing Tools - Third Edition
Learning Selenium Testing Tools - Third Edition

Leverage the power of Selenium to build your own real-time test cases from scratch

About This Book

  • Build automated scripts and develop Test Automation Frameworks using the Selenium WebDriver tool
  • Automate tests to ensure error free, quality software
  • A comprehensive guide...
Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy