|
System crash
|
Paul Kropp |
Someone crashes the computers at Devin's school. The ATM at the bank where his dad works starts spitting out extra cash. What's going on? And why? Can Devin and Shelley figure it out in time? If they… |
OL11690328W |
|
The best of 2600
|
Emmanuel Goldstein |
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… |
OL11938512W |
|
24 deadly sins of software security
|
Michael Howard |
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … |
OL12066725W |
|
Next generation SSH2 implementation
|
Dale Liu |
The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… |
OL13614374W |
|
Assessing and managing security risk in IT systems
|
John McCumber |
Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. Thi… |
OL13638173W |
|
Testing code security
|
Maura A. Van der Linden |
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code re… |
OL13683298W |
|
The web application hacker's handbook
|
Dafydd Stuttard,Dafydd Stuttard |
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… |
OL13814659W |
|
Simple Computer Transfer and Backup
|
CA |
CA has assembled dozens of real-world stories from customers to help readers understand how to use the included software to move all of their songs, pictures, files, and settings over to a new comput… |
OL15102682W |
|
Rootkits for dummies
|
Larry Stevenson |
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… |
OL15103013W |
|
Codes
|
Richard A Mollin |
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… |
OL15170247W |
|
RFID Handbook
|
Syed A. Ahson |
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… |
OL15172470W |
|
The CEH Prep Guide
|
Ronald L. Krutz |
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … |
OL15172912W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
CompTIA Security+TM All-in-One Exam Guide
|
Gregory B White |
A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-OneGet complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive reso… |
OL15173862W |
|
Information Security Cost Management
|
Ioana V Bazavan |
While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practi… |
OL15174009W |
|
Network Security Bible
|
Eric Cole |
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest de… |
OL15177311W |
|
Securing E-Business Applications and Communications
|
Jonathan S Held |
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… |
OL15183796W |
|
The Executive’s Guide to Privacy Management
|
Michael Erbschloe |
A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… |
OL15183825W |
|
Active Defense
|
Chris Brenton |
Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… |
OL15188346W |
|
Incident Response & Computer Forensics
|
Kevin Mandia |
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Completely Updated with the Latest Technique… |
OL15189060W |