Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Physical and Logical Security Convergence: Powered By Enterprise Security Management
Security in the post 9/11 world is about much more than just guns, guards and gates. The authors make a tremendous contribution to today's security debate by offering thoughtful and sensible recommendations that will help any reader understand the challenges of the networked world we now live in.- Roger Cresser, NBC News terrorism analyst
...
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a...

Nessus Network Auditing (Jay Beale's Open Source Security)
Nessus Network Auditing (Jay Beale's Open Source Security)

Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, many of whom rely on Nessus as the foundation to their security practices. Now, Nessus Project Founder Renaud Deraison and...

LEGO Mindstorms Masterpieces: Building Advanced Robots
LEGO Mindstorms Masterpieces: Building Advanced Robots
In LEGO Mindstorm Masterpieces, some of the world's leading LEGO Mindstorms inventors share their knowledge and development secrets. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will include detailed discussions of the mechanics that drive the robot - and...
Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical...

Configuring Citrix Metaframe for Windows 2000 Terminal Services
Configuring Citrix Metaframe for Windows 2000 Terminal Services
Citrix MetaFrame can deliver Windows-based applications to any user, anywhere regardless of network connection, LAN protocol, or client operating system. Configuring Citrix MetaFrame for Windows 2000 Terminal Services is written for system administrators who are deploying Citrix MetaFrame in a Windows 2000 environment. It examines MetaFrame's...
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Check Point NGX R65 Security Administration
Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity...
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic...
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy