|
The best of 2600
|
Emmanuel Goldstein |
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… |
OL11938512W |
|
Payment card industry data security standard handbook
|
Timothy M. Virtue |
Clearly written and easy to use, Payment Card Industry Data Security Standard Handbook is your single source along the journey to compliance with the Payment Card Industry Data Security Standard (PCI… |
OL11962965W |
|
Next generation SSH2 implementation
|
Dale Liu |
The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… |
OL13614374W |
|
Securing PHP web applications
|
Tricia Ballad |
Easy, Powerful Code Security Techniques for Every PHP Developer
Hackers specifically target PHP Web applications. Why? Because they know many of these apps are written by programmers with little o… |
OL13617981W |
|
Energy and environmental challenges to security
|
NATO Advanced Research Workshop on Energy and Environmental Challenges to Security (2007 Budapest, Hungary) |
The thirst for energy and the need to manage environmental impacts arising from the carbon economy are urgent issues facing this and future generations. The environment and security nexus provide an … |
OL15024433W |
|
CCSP
|
Todd Lammle |
Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides: In-depth coverage of every SECUR exam objective Practical information on Cisc… |
OL15068518W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
SECUR Exam Cram 2 (Exam Cram 642-501)
|
David Minutella |
Your resource to passing the Cisco CCSP SECUR Certification Exam!
Join the ranks of readers who have trusted Exam Cram 2 to their certification preparation needs! The CCSP SECUR Exam Cram 2 (Exam 6… |
OL15175400W |
|
Securing E-Business Applications and Communications
|
Jonathan S Held |
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… |
OL15183796W |
|
Engineering information security
|
Stuart Jacobs |
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … |
OL15455552W |
|
Managed code rootkits
|
Erez Metula |
"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change … |
OL15520822W |
|
Frameworks for ICT policy
|
Esharenana E. Adomi |
"This book provides policy-relevant insights and information to aid those engaged in systematic research and teaching about ICT policy formation and implementation"--Provided by publisher. |
OL15536435W |
|
Improvised Explosive Devices in Iraq
|
Andrew Smith |
Surprise is a familiar term in military writings and is enshrined in most nations’ doctrine. Surprises that emerge in tactics, however, can also operate at the strategic and operational levels and ar… |
OL15866343W |
|
Cyber security standards, practices and industrial applications
|
Junaid Ahmed Zubairi |
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classific… |
OL15917366W |
|
CompTIA security+ study guide
|
Emmett A. Dulaney |
"The preparation you need for the CompTIA Security+ exam SY0-301This top-selling study guide helps candidates prepare for exam SY0-301 and certification as a CompTIA Security+ administrator. Inside t… |
OL15934060W |
|
Facebook me!
|
Dave Awl |
A guide to using the online social network provides information on creating a profile, communicating with friends, using Facebook applications, and using Facebook to promote projects and businesses. |
OL15935375W |
|
Pro PHP security
|
Chris Snyder |
Provides information on securing PHP applications, covering such topics as SQL injection, XSS, remote execution, temporary files, REST services, CAPTCHAs, identity verification, and versioning. |
OL15955481W |
|
Penetration tester's open source toolkit
|
Jeremy Faircloth |
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… |
OL15981093W |
|
Auditing cloud computing
|
Ben Halpert |
"The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment. Many organizations are reporting or projecting a significant cost savings through the use of … |
OL16014206W |
|
Computer network security and cyber ethics
|
Joseph Migga Kizza |
"Focuses on security issues, increasing awareness of the magnitude of cyber vandalism, and the ways to protect ourselves and our society, how cyber attacks are committed, and what efforts are being u… |
OL16214268W |