Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Get ready to pass the CISSP exam and earn your certification with this advanced test guide
Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...
This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities and then discussing the countermeasures to address them. Some of the topics and...
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...
This book takes a novel approach to the presentation and understanding of a controversial topic in
modern-day society: hacking. The term hacker was originally used to denote positively-motivated individuals
wanting to stretch the capabilities of computers and networks. In contrast, the term cracker was
a later version of the term,...
Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...
Prepare for the new version of CEH certification with this advanced guide
Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...
How to secure systems that weren't built for security
Worldwide, critical economic and governmental infrastructures have evolved into complex networks that facilitate communication, cost reduction, and efficiency. But the very features that create such benefits make these supervisory control and data acquisition, or SCADA, systems a security...
This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...
The Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new...