Category: Security

Secrets and Lies: Digital Security in a Networked World 0

Secrets and Lies: Digital Security in a Networked World

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive...

Application Architecture for WebSphere 0

Application Architecture for WebSphere

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on, best-practice guide to...

Linux Server Hacks 0

Linux Server Hacks

A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the...

Practical Intrusion Analysis 0

Practical Intrusion Analysis

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful...

IPv6 Security 0

IPv6 Security

Protection measures for the next Internet Protocol As the world’s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two...

Network Security Auditing 0

Network Security Auditing

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with...

Penetration Testing and Network Defense 0

Penetration Testing and Network Defense

The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database...

Security of Self-Organizing Networks 0

Security of Self-Organizing Networks

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental security topics and often-used terms to set the foundation for the...

Metasploit: The Penetration Tester’s Guide 0

Metasploit: The Penetration Tester’s Guide

“The best guide to the Metasploit Framework.” —HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere,...

Lifehacker, 3rd Edition 0

Lifehacker, 3rd Edition

A new edition, packed with even more clever tricks and methods that make everyday life easier Lifehackers redefine personal productivity with creative and clever methods for making life easier and more enjoyable. This new edition of...