 |
|
|
|
|
|
 Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes... |  |  Protecting Your Mobile App IP: The Mini Missing Manual
Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do... |  |  Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 |