Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Home Network Security Simplified
Home Network Security Simplified

Phishing. Malware. Spyware. Trojan horses. Firewalls. Parental controls. If you have a home computer connected to the Internet, you need to understand these security terms. If that connection is high-speed (always on) or you run a wireless network, your needyour vulnerabilityis that much greater. Now, with Home Network Security...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Deploying Microsoft Forefront Protection 2010 for Exchange Server
Deploying Microsoft Forefront Protection 2010 for Exchange Server

When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural...

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Defeating the Hacker: A non-technical guide to computer security
Defeating the Hacker: A non-technical guide to computer security
This is a book about hackers, crackers, phishing, pharming, spammers, scammers, virus-writers, Trojan horses, malware and spyware, and how to keep them out of your company's computer systems. By which I mean the private computers on your employees' desks in the office and at home, and the servers which look after your company's email, file storage...
Internet Fraud Casebook: The World Wide Web of Deceit
Internet Fraud Casebook: The World Wide Web of Deceit

Real case studies on Internet fraud written by real fraud examiners

Internet Fraud Casebook: The World Wide Web of Deceit is a one-of-a-kind collection of actual cases written by the fraud examiners who investigated them. These stories were hand-selected from hundreds of submissions and together form a comprehensive,...

Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy