|
|
|
|
| | Applied Security VisualizationAPPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a... | | Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
-
Recipes designed to educate you extensively on the penetration testing principles and Kali...
|
|
Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | The Mazzel Ritual: Culture, Customs and Crime in the Diamond TradeThe academic study of diamonds is as multi-faceted as the precious stones themselves. Mineralogists and geographers have written about them, as have historians and economists and students of art and fashion. They each shine their light on a different aspect of this source of luminous radiance. But who would venture to describe the entire... |
|
Architecture Design for Soft Errors"Dr. Shubu Mukherjee's book is a welcome surprise: books by architecture leaders in major companies are few and far between. Written from the viewpoint of a working engineer, the book describes sources of soft errors and solutions involving device, logic, and architecture design to reduce the effects of soft errors." - Max Baron,... | | Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)Dr. Gary McGraw, a well-known software security expert, said, “First things first—make sure you know how to code, and have been doing so for years. It is better to be a developer (and architect) and then learn about security than to be a security guy and try to learn to code” (McGraw 2004). If you are interested in becoming a... | | |
|
Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... | | Hacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of... | | Look Both Ways: Help Protect Your Family on the InternetLearn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a... |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |