Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Principles of Information Security
Principles of Information Security
As global networks expand the interconnection of the world’s information systems, the smooth operation of communication and computing solutions becomes vital. However, recurring events such as virus and worm attacks and the success of criminal attackers illustrate the weaknesses in current information technologies and the...
Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

The Browser Hacker's Handbook
The Browser Hacker's Handbook

Hackers exploit browser vulnerabilities to attack deep within networks

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security...

CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Hack Proofing Sun Solaris 8
Hack Proofing Sun Solaris 8
Two of Sun Solaris's prime attractions are its reliability and the high availability of servers running it. These advantages can be, however, negated by carelessness. Forget to apply a patch, or neglect to synchronize your servers' system clocks, and someone who's paying more attention will exploit the holes you've left in your system. The authors...
Testing Code Security
Testing Code Security

The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and...

Cisco Wireless LAN Security
Cisco Wireless LAN Security

Cisco Wireless LAN Security is an in-depth guide to wireless LAN technology and security, introducing the key aspects of 802.11 security by illustrating major wireless LAN (WLAN) standards that can protect the entire network. Because a WLAN is less effective as an isolated piece of the...

CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)
CompTIA Security+ Guide to Network Security Fundamentals (with CertBlaster Printed Access Card) (MindTap Course List)

This best-selling guide provides a complete, practical, up-to-date introduction to network and computer security. SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Fifth Edition, maps to the new CompTIA Security+ SY0-401 Certification Exam, providing thorough coverage of all domain objectives to help readers prepare for professional...

Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Hack Proofing XML
Hack Proofing XML
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document...
Hacking For Dummies
Hacking For Dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy