Home | Amazing | Today | Tags | Publishers | Years | Search 
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Deploying Microsoft Forefront Protection 2010 for Exchange Server
Deploying Microsoft Forefront Protection 2010 for Exchange Server

When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural...

Internet Fraud Casebook: The World Wide Web of Deceit
Internet Fraud Casebook: The World Wide Web of Deceit

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive,...

Mobile Application Security
Mobile Application Security

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest...

Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your...

Easy Microsoft Windows 7
Easy Microsoft Windows 7

SEE IT DONE. DO IT YOURSELF.

 

It’s that Easy! Easy Microsoft Windows 7 teaches you the fundamentals of working with Microsoft’s latest operating system. Fully illustrated steps with simple instructions guide you through every...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Microsoft® Exchange Server 2007 Administrator's Companion
Microsoft® Exchange Server 2007 Administrator's Companion
Get your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy