 |
|
 Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |  |  OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)The OpenSSH suite of tools provides replacements for some of the common administrative tools used today such as telnet, FTP and the r-utilities; yet, these tools, considered insecure because they use clear-text communication over the network, are in still in common use. OpenSSH provides an encrypted channel between computers and remote servers... |  |  Hiding in Plain Sight: Steganography and the Art of Covert CommunicationYour hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted... |
|
 C++ Plus Data Structures, Third EditionC++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their... |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |  |  Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |
|
|
|
Result Page: 9 8 7 6 5 4 3 2 1 |