Books

20+ results found
Title Authors Description OpenBook ID
System crash System crash Paul Kropp Someone crashes the computers at Devin's school. The ATM at the bank where his dad works starts spitting out extra cash. What's going on? And why? Can Devin and Shelley figure it out in time? If they… OL11690328W
The best of 2600 The best of 2600 Emmanuel Goldstein Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… OL11938512W
24 deadly sins of software security 24 deadly sins of software security Michael Howard "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … OL12066725W
Next generation SSH2 implementation Next generation SSH2 implementation Dale Liu The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… OL13614374W
Assessing and managing security risk in IT systems Assessing and managing security risk in IT systems John McCumber Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… OL13638173W
Testing code security Testing code security Maura A. Van der Linden The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code re… OL13683298W
The web application hacker's handbook The web application hacker's handbook Dafydd Stuttard,Dafydd Stuttard This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… OL13814659W
Simple Computer Transfer and Backup Simple Computer Transfer and Backup CA CA has assembled dozens of real-world stories from customers to help readers understand how to use the included software to move all of their songs, pictures, files, and settings over to a new comput… OL15102682W
Rootkits for dummies Rootkits for dummies Larry Stevenson A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… OL15103013W
Codes Codes Richard A Mollin From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… OL15170247W
RFID Handbook RFID Handbook Syed A. Ahson Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… OL15172470W
The CEH Prep Guide The CEH Prep Guide Ronald L. Krutz The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … OL15172912W
Public Key Infrastructure Public Key Infrastructure John R Vacca With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… OL15172981W
CompTIA Security+TM All-in-One Exam Guide CompTIA Security+TM All-in-One Exam Guide Gregory B White A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-OneGet complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive reso… OL15173862W
Information Security Cost Management Information Security Cost Management Ioana V Bazavan While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practi… OL15174009W
Network Security Bible Network Security Bible Eric Cole The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest de… OL15177311W
Securing E-Business Applications and Communications Securing E-Business Applications and Communications Jonathan S Held Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… OL15183796W
The Executive’s Guide to Privacy Management The Executive’s Guide to Privacy Management Michael Erbschloe A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… OL15183825W
Active Defense Active Defense Chris Brenton Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… OL15188346W
Incident Response & Computer Forensics Incident Response & Computer Forensics Kevin Mandia Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Completely Updated with the Latest Technique… OL15189060W
Next page