Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers...
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...
Identity Theft: A Reference Handbook (Contemporary World Issues)
A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.
• Includes a chronology of key decisions, cases, and government action in the development...
Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms, Volume 1
The aim of Apoptosis, Cell Signaling, and Human Diseases: Molecular Mechanisms
is to present recent developments in cell survival and apoptotic pathways and
their involvement in human diseases, such as cancers and neurodegenerative disorders.
This requires an integration of knowledge from several fields of research, including...
|Result Page: 30 29 28 27 26 25 24 23 22 21 |