Télécharger le livre :  XSS Attacks
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Next Generation SSH2 Implementation
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn Cybercrime and Digital Forensics Book Period
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Administering Office Communications Server 2007
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X Exploits and Defense
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Catastrophic Loss of Sensitive Data
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn IT Security Management Book Period
The security field evolves rapidly becoming broader and more complex each year.The common thread tying the field together is the discipline of management.The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Programming Lego Mindstorms NXT
Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

35,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Open Source Fuzzing Tools
Fuzzing is often described as a "black box software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for theMetasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing....

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring Exchange Server 2007
The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn Firewall Book Period
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.Compiled from the best of the Syngress firewall library and authored by product...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Secure Your Network for Free
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....

Editeur : Syngress
Parution : 2011-04-18
PDF, epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  No Tech Hacking
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  GFI Network Security and PCI Compliance Power Tools
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Application Vulnerabilities
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them,...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
<< < 910111213 >