 |
|
|
|
|
 |  |  Macworld's Mac Security Superguide
Macworld's Mac Security Superguide
Keep your data and computer safe.
The expert team of Macworld editors share their knowledge in this essential guide to keep your computer, your network, and your personal information safe and secure; further your head start when it comes to malware, get tips to keep your... |  |  Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
 Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |  |  How Personal & Internet Security Works (How It Works)In 2003, fraud and identity theft cost consumers at least $437 million dollars. In 2004, the U.S. Federal Trade Commission received 247,000 consumer complaints in 2004 (up 15% from 2003), from individuals whose identity was stolen, and according to Reuters.com (2/2005), Americans lost $548 million dollars to identity theft... |  |  Computer Security in the 21st CenturyComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include... |
|
 |  |  Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |  |  Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... |
|
|
Result Page: 5 4 3 2 1 |