 |
|
 Preventing Web Attacks with ApacheThe only end-to-end guide to securing Apache Web servers and Web applications
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications.... |  |  HP-UX CSE : Official Study Guide and Desk ReferenceHP-UX CSE: Official Study Guide and Desk Reference is the definitive HP-UX CSE exam preparation guide and reference.
HP-approved coverage of all three CSE exams: CSE HP-UX Advanced System Administration, CSE High Availability Using HP-UX... |  |  |
|
|
 Hiding in Plain Sight: Steganography and the Art of Covert CommunicationYour hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted... |  |  C++ Plus Data Structures, Third EditionC++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their... |  |  Configuring Windows 2000 Without Active DirectoryIn Configuring Windows 2000 Without Active Directory, Carol Bailey makes a persuasive argument that her title procedure isn't the logical equivalent of making a banana split without fruit. Declining to use the primary new feature of Windows 2000 removes a thick layer of complexity from Windows 2000, she writes, and makes it much easier to... |
|
 Security Assessment: Case Studies for Implementing the NSA IAMThe National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... |  |  Securing LINUX Step by StepThis guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,... |  |  Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... |
|
Result Page: 9 8 7 6 5 4 3 2 1 |