|
|
|
|
Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... | | Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... | | Practical Linux Security Cookbook
Key Features
-
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
-
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
-
Enhance file system security and local and remote
... |
|
|
|
Penetration Tester's Open Source ToolkitThis is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost... | | Wireless Security: Know It AllThe latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!
The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and... | | |
|
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |