|
Rootkits for dummies
|
Larry Stevenson |
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… |
OL15103013W |
|
The net delusion
|
E. Morozov,Eduardo G. Murillo,Evgeny Morozov |
In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also e… |
OL15415061W |
|
Penetration tester's open source toolkit
|
Jeremy Faircloth |
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… |
OL15981093W |
|
Rootkit arsenal
|
Bill Blunden |
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothol… |
OL16318402W |
|
Recent advances in intrusion detection
|
Herve Debar |
Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings<br />Author: Hervé Debar, Ludovic Mé, S. Felix Wu<br /> Published by Sp… |
OL18797145W |
|
Password
|
Martin Paul Eve |
Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the d… |
OL19774185W |
|
Intrusion Detection in Distributed Systems
|
Peng Ning |
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… |
OL19859329W |
|
Public-Key Cryptography
|
Arto Salomaa |
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives… |
OL19897855W |
|
Implementing 802.1X Security Solutions for Wired and Wireless Networks
|
Jim Geier |
You know it's essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that y… |
OL8205514W |
|
Hugo Cornwall's new hacker's handbook
|
Steve Gold |
This guide to making unauthorized entries into computer networks covers computer and network viruses, the case of Edward Austin Singh and many other cases that have captured the public imagination. T… |
OL8773286W |
|
802.1X port-based authentication
|
Edwin Lyle Brown |
Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-… |
OL8777362W |
|
Cryptography and Security Services
|
Manuel Mogollon |
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize tech… |
OL9960085W |