Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

SIP Security
SIP Security
This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms...

Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
VMware VI3 Implementation and Administration
VMware VI3 Implementation and Administration

This is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best...

Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
SQL Injection Attacks and Defense
SQL Injection Attacks and Defense

SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known...

CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
CEH Certified Ethical Hacker Certification Exam Preparation Course in a Book for Passing the CEH Certified Ethical Hacker Exam
This self-study exam preparation guide for the CEH Certified Ethical Hacker certification exam contains everything you need to test yourself and pass the Exam. All Exam topics are covered and insider secrets, complete explanations of all CEH Certified Ethical Hacker subjects, test tricks and tips, numerous highly realistic sample questions, and...
ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Terrorism and Public Safety Policing: Implications for the Obama Presidency
Terrorism and Public Safety Policing: Implications for the Obama Presidency

A Pragmatic Answer to the Systematic Change Already Underway

The trends, data, and battle-tested logic do not lie. A perfect storm of extremist ideologies is on the horizon that threatens to challenge the current state of public safety—forcing police chiefs, public administrators, and security...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Mobile Application Security
Mobile Application Security

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy