Category: Security

Fragile Networks 0

Fragile Networks

A unified treatment of the vulnerabilities that exist in real-world network systems—with tools to identify synergies for mergers and acquisitionsFragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain World presents a comprehensive study of network systems...

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition 0

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

THE LATEST STRATEGIES FOR UNCOVERING TODAY’S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical...

Secure Semantic Service-Oriented Systems 0

Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving...

Computer Incident Response and Product Security 0

Computer Incident Response and Product Security

Network Security Incident Response provides practical guidelines for building an SIRT team as well offering advice on responding to actual incidents. For many companies, incident response is new territory. Some companies do not have an incidence...

Hacking Exposed: Wireless, 2nd Edition 0

Hacking Exposed: Wireless, 2nd Edition

The latest wireless security solutions Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today’s established and emerging wireless technologies, Hacking Exposed Wireless, second edition...

Hacking Exposed: Malware & Rootkits 0

Hacking Exposed: Malware & Rootkits

Don’t let another machine become a zombie in the malware army Defend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today’s hackers use...

Hacking Exposed: Linux, 3rd Edition 0

Hacking Exposed: Linux, 3rd Edition

The Latest Linux Security Solutions This authoritative guide will help you secure your Linux network–whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way,...

Hacking Exposed: Web 2.0 0

Hacking Exposed: Web 2.0

Lock down next-generation Web services “This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats.”...