 |
|
 Cisco Network Security Little Black BookWith this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and... |  |  Security for Wireless Ad Hoc NetworksWireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature... |  |  Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |
|
 Solaris 9 Security (Networking)Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol... |  |  Designing BSD Rootkits: An Introduction to Kernel HackingDesigning BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike... |  |  Coping with Uncertainty: Modeling and Policy IssuesUncertainties and risks have always been, and will remain, present; both in everybody’s life and in policy making. This presence is not always recognized because humans tend to perceive the world in a deterministic way, and in most cases succeed in somehow dealing with uncertainties. However, ignoring uncertainties often results in serious... |
|
 Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |  |  Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)Dr. Gary McGraw, a well-known software security expert, said, “First things first—make sure you know how to code, and have been doing so for years. It is better to be a developer (and architect) and then learn about security than to be a security guy and try to learn to code” (McGraw 2004). If you are interested in becoming a... |  |  How to Cheat at Configuring Open Source Security ToolsThe Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |