|
|
|
|
WarDriving: Drive, Detect, Defend: A Guide to Wireless SecurityThe term WarDriving originates from WarDialing, a term introduced to the public by Matthew Broderick's character, David Lightman, in the 1983 movie "WarGames." WarDialing is the practice of using a modem attached to a computer to dial an entire exchange of telephone numbers to locate any computers with modems attached to them.... | | How to Cheat at Configuring ISA Server 2004If deploying and managing ISA Server 2004 is just one of a hundred responsibilities you have as a System Administrator, How to Cheat at Configuring ISA Server 2004 is the perfect book for you. This is a concise, accurate, enterprise tested method for the successful deployment of ISA Server. Written by ISA Server guru and Microsoft Most... | | Intrusion Prevention and Active Response : Deploying Network and Host IPSFrom the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be... |
|
|
Software Piracy ExposedThis book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software... | | Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
To have a successful career as a Cisco Certified Network Associate (CCNA), it is imperative that you understand the terminology used by individuals in the field of networking. To communicate effectively with peers and staff, you need to have a firm grasp on concepts and jargon you will be exposed to as a CCNA. Understanding basic terms and... | | The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP LawThe content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.
This book is designed to empower you to:
* Understand... |
|
Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... | | | | Programmer's Ultimate Security DeskRefThe Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |