Télécharger le livre :  Google Hacking for Penetration Testers
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Editeur : Syngress
Parution : 2015-11-10
epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Study of Black Hole Attack Solutions
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Editeur : Syngress
Parution : 2015-11-03
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  ISSE 2015
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include:·         Encrypted Communication·         Trust Services, eID...

Editeur : Springer Vieweg
Parution : 2015-11-02
PDF

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Traffic Anomaly Detection
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies...

Editeur : Iste Press - Elsevier
Parution : 2015-10-31
PDF, epub sans DRM

61,14

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Physical and Data-Link Security Techniques for Future Communication Systems
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. Topics ranging from information theory-based security to coding for security and cryptography are...

Editeur : Springer
Parution : 2015-09-24
PDF, ePub

147,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime Risks and Responses
This book examines the most recent and contentious issues in relation to cybercrime facing the world today, and how best to address them. The contributors show how Eastern and Western nations are responding to the challenges of cybercrime, and the latest trends and...

Editeur : Palgrave Macmillan
Parution : 2015-09-01
Collection : Palgrave Studies in Cybercrime and Cybersecurity PDF

52,74

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...

Editeur : Syngress
Parution : 2015-08-31
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Antivirus Hacker's Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future...

Editeur : Wiley
Parution : 2015-08-27
PDF, ePub

45,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  You: For Sale
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...

Editeur : Syngress
Parution : 2015-08-20
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Der IT Security Manager
Profitieren Sie von den Erfahrungen der Autoren! Mit diesem Buch erhalten Sie das aktuelle und zuverlässige Praxiswissen zum IT-Sicherheitsmanagement in Unternehmen und Behörden –  Aufbau und Inhalt des Werkes haben sich in der Aus- und Fortbildung von...

Editeur : Springer Vieweg
Parution : 2015-08-12
Collection : Edition PDF, ePub

66,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Smart Grid Security
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...

Editeur : Syngress
Parution : 2015-08-11
epub sans DRM

90,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Infosec Management Fundamentals
Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business...

Editeur : Syngress
Parution : 2015-08-10
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....

Editeur : Syngress
Parution : 2015-08-10
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dissecting the Hack
Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor,Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a...

Editeur : Syngress
Parution : 2015-07-20
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Network Security
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect...

Editeur : Wiley
Parution : 2015-07-10
PDF, ePub

130,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cloud Storage Security
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case...

Editeur : Elsevier
Parution : 2015-07-06
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Python Passive Network Mapping
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a...

Editeur : Syngress
Parution : 2015-06-10
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Vehicular Ad Hoc Network Security and Privacy
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary...

Editeur : Wiley-IEEE Press
Parution : 2015-06-05
Collection : IEEE Press Series on Information and Communication Networks Security PDF, ePub

128,66

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Cloud Security Ecosystem
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the...

Editeur : Syngress
Parution : 2015-06-01
PDF, epub sans DRM

90,68

Téléchargement immédiat
Dès validation de votre commande
<< < 1213141516 >