Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...
Secure Coding in C and C++
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...
Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability
With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Tony Redmond, a Microsoft MVP and award-winning author, you will:
Understand major changes to Exchange Server architecture...
Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents...
Identity Theft: A Reference Handbook (Contemporary World Issues)
A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.
• Includes a chronology of key decisions, cases, and government action in the development...
|Result Page: 33 32 31 30 29 28 27 26 25 24 |