Books

12 results found
Title Authors Description OpenBook ID
Rootkits for dummies Rootkits for dummies Larry Stevenson A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… OL15103013W
The net delusion The net delusion E. Morozov,Eduardo G. Murillo,Evgeny Morozov In this spirited book, journalist and social commentator Evgeny Morozov shows that by falling for the supposedly democratizing nature of the Internet, Western do-gooders may have missed how it also e… OL15415061W
Penetration tester's open source toolkit Penetration tester's open source toolkit Jeremy Faircloth "Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… OL15981093W
Rootkit arsenal Rootkit arsenal Bill Blunden While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothol… OL16318402W
Recent advances in intrusion detection Recent advances in intrusion detection Herve Debar Recent Advances in Intrusion Detection: Third International Workshop, RAID 2000 Toulouse, France, October 2–4, 2000 Proceedings<br />Author: Hervé Debar, Ludovic Mé, S. Felix Wu<br /> Published by Sp… OL18797145W
Password Password Martin Paul Eve Where does a password end and an identity begin? A person might be more than his chosen ten-character combination, but does a bank know that? Or an email provider? What's an 'identity theft' in the d… OL19774185W
Intrusion Detection in Distributed Systems Intrusion Detection in Distributed Systems Peng Ning Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… OL19859329W
Public-Key Cryptography Public-Key Cryptography Arto Salomaa Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives… OL19897855W
Implementing 802.1X Security Solutions for Wired and Wireless Networks Implementing 802.1X Security Solutions for Wired and Wireless Networks Jim Geier You know it's essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that y… OL8205514W
Hugo Cornwall's new hacker's handbook Hugo Cornwall's new hacker's handbook Steve Gold This guide to making unauthorized entries into computer networks covers computer and network viruses, the case of Edward Austin Singh and many other cases that have captured the public imagination. T… OL8773286W
802.1X port-based authentication 802.1X port-based authentication Edwin Lyle Brown Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-… OL8777362W
Cryptography and Security Services Cryptography and Security Services Manuel Mogollon Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize tech… OL9960085W