| |
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...
Editeur :
Wiley
Parution :
2011-02-02
PDF, ePub
|
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...
Editeur :
Syngress
Parution :
2011-01-13
epub sans DRM
|
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS),...
Editeur :
Wiley
Parution :
2011-01-07
PDF, ePub
|
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently...
Editeur :
Syngress
Parution :
2011-01-07
epub sans DRM
|
Thoughts on Interaction Design, Second Edition, contemplates and contributes to the theory of Interaction Design by exploring the semantic connections that live between technology and form that are brought to life when someone uses a product. It defines Interaction...
Editeur :
Morgan Kaufmann
Parution :
2011-01-04
epub sans DRM
|
Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national...
Editeur :
Butterworth-Heinemann
Parution :
2010-12-20
epub sans DRM
|
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information...
Editeur :
Syngress
Parution :
2010-12-13
epub sans DRM
|
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...
Editeur :
Syngress
Parution :
2010-11-25
epub sans DRM
|
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...
Editeur :
Syngress
Parution :
2010-11-03
epub sans DRM
|
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...
Editeur :
Syngress
Parution :
2010-11-02
epub sans DRM
|
Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...
Editeur :
Syngress
Parution :
2010-10-29
epub sans DRM
|
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows....
Editeur :
Syngress
Parution :
2010-10-28
epub sans DRM
|
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses,...
Editeur :
Wiley
Parution :
2010-10-01
PDF, ePub
|
Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...
Editeur :
Syngress
Parution :
2010-09-10
epub sans DRM
|
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital...
Editeur :
Wiley
Parution :
2010-08-31
ePub
|
Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem.
Metrics and Methods for...
Editeur :
Syngress
Parution :
2010-08-21
epub sans DRM
|
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...
Editeur :
Syngress
Parution :
2010-08-07
epub sans DRM
|
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec...
Editeur :
Syngress
Parution :
2010-08-06
ePub, PDF sans DRM
|
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they...
Editeur :
Syngress
Parution :
2010-08-06
epub sans DRM
|
The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique.The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn't just describe...
Editeur :
Morgan Kaufmann
Parution :
2010-08-04
epub sans DRM
|