|
System crash
|
Paul Kropp |
Someone crashes the computers at Devin's school. The ATM at the bank where his dad works starts spitting out extra cash. What's going on? And why? Can Devin and Shelley figure it out in time? If they… |
OL11690328W |
|
The best of 2600
|
Emmanuel Goldstein |
Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a co… |
OL11938512W |
|
24 deadly sins of software security
|
Michael Howard |
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for … |
OL12066725W |
|
The web application hacker's handbook
|
Dafydd Stuttard,Dafydd Stuttard |
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… |
OL13814659W |
|
Simple Computer Transfer and Backup
|
CA |
CA has assembled dozens of real-world stories from customers to help readers understand how to use the included software to move all of their songs, pictures, files, and settings over to a new comput… |
OL15102682W |
|
Rootkits for dummies
|
Larry Stevenson |
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, maki… |
OL15103013W |
|
Codes
|
Richard A Mollin |
From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potentia… |
OL15170247W |
|
RFID Handbook
|
Syed A. Ahson |
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world's largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwi… |
OL15172470W |
|
The CEH Prep Guide
|
Ronald L. Krutz |
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, … |
OL15172912W |
|
Public Key Infrastructure
|
John R Vacca |
With the recent Electronic Signatures in Global and National Commerce Act, public key cryptography, digital signatures, and digital certificates are finally emerging as a ubiquitous part of the Infor… |
OL15172981W |
|
Securing E-Business Applications and Communications
|
Jonathan S Held |
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… |
OL15183796W |
|
The Executive’s Guide to Privacy Management
|
Michael Erbschloe |
A McGRAW-HILL EBOOK EXCLUSIVE! The Executive’s Guide to Privacy Management compliments NET Privacy: A Guide to Implementing an Ironclad e-Business Privacy Plan, which provides a step-by-step approach… |
OL15183825W |
|
Active Defense
|
Chris Brenton |
Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… |
OL15188346W |
|
Incident Response & Computer Forensics
|
Kevin Mandia |
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Completely Updated with the Latest Technique… |
OL15189060W |
|
Engineering information security
|
Stuart Jacobs |
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … |
OL15455552W |
|
Managed code rootkits
|
Erez Metula |
"Introduces the reader briefly to managed code environments and rootkits in general--Completely details a new type of rootkit hiding in the application level and demonstrates how a hacker can change … |
OL15520822W |
|
Software engineering for secure systems
|
Haralambos Mouratidis |
"This book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to impleme… |
OL15616337W |
|
Digital identity and access management
|
Raj Sharman,Sanjukta Das Smith,Manish Gupta |
"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with … |
OL16142915W |
|
Reliability and availability of cloud computing
|
Eric Bauer |
"The book is intended for IS/IT system and solution architects, developers and engineers, as well as technical sales, product management, and quality management professionals"-- |
OL16486564W |
|
Fundamentals of Information Systems Security
|
David Kim |
Revised and updated with the latest information from this fast-paced field, Fundamentals of Information System Security, Second Edition provides a comprehensive overview of the essential concepts rea… |
OL16811240W |