 |
|
 BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |  |  Computer Forensics: A Pocket Guide
Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first... |  |  IBM WebSphere DataPower SOA Appliance Handbook
Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances
IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on... |
|
|
|
 Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |  |  Python Penetration Testing Essentials
Employ the power of Python to get the best out of pentesting
About This Book
-
Learn to detect and avoid various types of attacks that put the privacy of a system at risk
-
Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
... |  |  Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of... |
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |