Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the...

Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs

This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an...

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
VB.net Developer's Guide
VB.net Developer's Guide
The Complete Guide to Developing Applications with VB.NET

The introduction of VB.NET has sent many Visual Basic gurus back to the drawing board! VB.NET introduces a new set of standards, protocols, and syntax that previous users of Visual Basic will need to learn to regain their guru status and be positioned to create enterprise-critical...

Wireless Hacking: Projects for Wi-Fi Enthusiasts
Wireless Hacking: Projects for Wi-Fi Enthusiasts

Welcome to the world of “wireless magic.” 802.11 (Wi-Fi) wireless LANs have exploded onto the scene with an excitement not seen since the introduction of the Internet itself. Getting rid of the wires means getting rid of the hassle.With Wi-Fi, you can roam through your favorite coffee shop, boardroom or living room, all the while...

Mission Critical Internet Security
Mission Critical Internet Security
The best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This...
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security

A senior database manager at one of the world’s largest banks once told me that the best way to secure Oracle is to unplug it from the wall…and he is probably right. In fact, this holds true for nearly every networked application. Unfortunately, for many of us turning off the database is not an option; we must find another way to...

Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

How to Cheat at Configuring Open Source Security Tools
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and
...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy