|
|
|
|
|
|
Virtual Honeypots: From Botnet Tracking to Intrusion DetectionHoneypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and... | | Hacking exposed web applications, 3rd Edition
There is no escaping the reality that businesses live on the Web today. From banks to bookstores, from auctions to games, the Web is the place where most businesses ply their trade. For consumers, the Web has become the place where they do the majority of their business as well. For example, nearly 50 percent of all retail music sales in the... | | Buy-In: Saving Your Good Idea from Getting Shot Down
You've got a good idea. You know it could make a crucial difference for you, your organization, your community. You present it to the group, but get confounding questions, inane comments, and verbal bullets in return. Before you know what's happened, your idea is dead, shot down. You're furious. Everyone has lost: Those who ... |
|
|
|
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 |