|
|
|
|
|
|
|
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend... | | Security on the Web, Volume 83 (Advances in Computers)
This is Volume 83 of the Advances in Computers, subtitled Security on the Web.
This series, continuously published since 1960, is the oldest series covering the
development of the computer industry. With the impact that the World Wide Web
has on every facet of our lives today, this volume focuses on the security aspect of
computing.... | | Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |