 |
|
|
|
|
|
 Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |  |  Formal Correctness of Security Protocols (Information Security and Cryptography)Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in... |  |  Identity Theft: A Reference Handbook (Contemporary World Issues)
A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.
• Includes a chronology of key decisions, cases, and government action in the development... |
|
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 |