
Security
topmvp
这个作者很懒,什么都没留下…
展开
-
Perfect Passwords : Selection, Protection and Authentication
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember原创 2008-08-07 04:37:00 · 2403 阅读 · 0 评论 -
Hack Attacks Revealed
As the world becomes increasingly networked through the Internet, competitors, spies, disgruntled employees, bored teens, and hackers more frequently invade others computers to steal information, sabo原创 2008-08-07 05:02:00 · 379 阅读 · 0 评论 -
Hack I.T.: Security Through Penetration Testing
Penetration testing--in which professional, "white hat" hackers attempt to break through an organizations security defenses--has become a key defense weapon in todays information systems security arse原创 2008-08-07 05:03:00 · 425 阅读 · 0 评论 -
Intrusion Detection & Prevention
This book demonstrates, step-by-step, how to mount a comprehensive defense against cyber crime, perform real-time security monitoring, and implement a proactive incident response plan.http://rapidsh原创 2008-08-07 05:43:00 · 527 阅读 · 0 评论 -
Malware: Fighting Malicious Code
This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-lev原创 2008-08-07 05:46:00 · 540 阅读 · 0 评论 -
Security Warrior
Whats the worst an attacker can do to you? Youd better find out, right? Thats what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your at原创 2008-08-07 05:48:00 · 513 阅读 · 0 评论 -
Crackproof Your Software: Protect Your Software Against Crackers
This software protection guide describes the various ways crackers break registration keys, circumvent original CD checks, disable time limitations, and otherwise neutralize software protections. It i原创 2008-08-06 23:15:00 · 502 阅读 · 0 评论 -
Information security: principles and practice
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security s原创 2008-08-07 01:21:00 · 601 阅读 · 0 评论 -
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy towork.N原创 2008-08-07 05:04:00 · 395 阅读 · 0 评论 -
Defend I.T.: Security by Example
Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from r原创 2008-08-07 21:27:00 · 449 阅读 · 0 评论 -
Hacker's Delight
These are the timesaving techniques relished by computer hackers-those devoted and persistent code developers who seek elegant and efficient ways to build better software. The truth is that much of th原创 2008-08-07 03:34:00 · 1131 阅读 · 0 评论 -
Insider Threat
This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure I原创 2008-08-07 04:08:00 · 560 阅读 · 0 评论 -
Software Security : Building Security In
Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints,原创 2008-08-07 04:53:00 · 550 阅读 · 0 评论 -
Halting the Hacker: A Practical Guide to Computer Security, Second Edition
Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Li原创 2008-08-07 05:05:00 · 413 阅读 · 0 评论 -
Malicious Mobile Code: Virus Protection for Windows
This book covers malicious mobile code attacks on Windows PCs, including: computer viruses, macro viruses, Trojan horse programs, worms, email exploits, Java and ActiveX exploits, instant messaging at原创 2008-08-07 05:44:00 · 445 阅读 · 0 评论 -
Hacking: The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own h原创 2008-08-07 05:45:00 · 566 阅读 · 0 评论 -
Web Hacking: Attacks and Defense
Whether its petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacki原创 2008-08-07 05:49:00 · 447 阅读 · 0 评论 -
Web Security Basics
Web sites have become a powerful marketplace that can capsize a company when attacked by a virus or hacker. With this book, you can take the necesary steps today to avoid compromising the integrity of原创 2008-08-07 22:31:00 · 405 阅读 · 0 评论 -
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy towork.N原创 2008-08-08 09:10:00 · 435 阅读 · 0 评论 -
Managing Information Security Risks: The OCTAVE Approach
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpInformation security requires far more than the latest tool or technology. Organizations must understand exac原创 2008-08-20 20:36:00 · 521 阅读 · 0 评论 -
Managing Information Security Risks: The OCTAVE Approach
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpInformation security requires far more than the latest tool or technology. Organizations must understand exac原创 2008-08-19 21:26:00 · 438 阅读 · 0 评论 -
A Practical Guide to Managing Information Security
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpThis groundbreaking book helps you master the management of information security, concentrating on the proact原创 2008-08-22 20:48:00 · 433 阅读 · 0 评论 -
PGP & GPG: Email for the Practical Paranoid
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpOpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Priva原创 2008-08-22 20:18:00 · 403 阅读 · 0 评论 -
Inside Network Perimeter Security
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpSecurity professionals and administrators now have access to one of the most valuable resources for learning原创 2008-08-22 20:45:00 · 612 阅读 · 0 评论 -
Security Fundamentals for E-Commerce
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpIf you?re charged with maintaining the security of e-commerce sites, you need this unique book that provides原创 2008-08-22 21:04:00 · 415 阅读 · 0 评论 -
The Hacker's Handbook: The Strategy Behind Breaking into and Defending Networks
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpThis guide reveals the technical aspects of hacking that are least understood by network administrators. It a原创 2008-08-22 21:08:00 · 439 阅读 · 0 评论 -
Advanced Host Intrusion Prevention with CSA
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpMaximize end-point security with Cisco Security Agent *Eases the complexity of CSA installation and manag原创 2008-08-24 17:31:00 · 444 阅读 · 0 评论 -
Information Security Fundamentals
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpInformation Security Fundamentals allows security professionals to gain a solid understanding of the foundati原创 2008-08-24 18:35:00 · 450 阅读 · 0 评论 -
Cryptographic Security Architecture : Design and Verification
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpA cryptographic security architecture is the collection of hardware and software that protects and controls t原创 2008-08-24 18:21:00 · 429 阅读 · 0 评论 -
Cyber Adversary Characterization: Auditing the Hacker Mind
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpDevelop a Well-Measured Defense Against CybercriminalsWhen we speak of the hacker mind, then, we have come to原创 2008-08-24 18:25:00 · 374 阅读 · 0 评论 -
Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpIn the fast-paced, caffeine-powered, and sometimes reckless world of computer security, the security analogy原创 2008-08-24 18:39:00 · 428 阅读 · 1 评论 -
Web Security Field Guide
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpHands-on techniques for securing Windows(r) servers, browsers, and network communications* Create effecti原创 2008-08-24 21:11:00 · 413 阅读 · 0 评论 -
The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpThe Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments provides det原创 2008-08-31 22:01:00 · 901 阅读 · 0 评论 -
Defeating the Hacker : A non-technical guide to computer security
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpThe current struggle between IT security and computer hackers is reaching crisis point. Corporate dependency原创 2008-09-01 19:43:00 · 477 阅读 · 0 评论 -
Hack Attacks Testing: How to Conduct Your Own Security Audit
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpLearn how to conduct thorough security examinations via illustrations and virtual simulations A network sec原创 2008-09-05 21:33:00 · 443 阅读 · 0 评论 -
Hacker Web Exploitation Uncovered
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpA description and analysis of the vulnerabilities caused by programming errors in Web applications, this book原创 2008-09-06 18:15:00 · 449 阅读 · 0 评论 -
Extreme Exploits: Advanced Defenses Against Hardcore Hacks
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exp原创 2008-09-06 18:17:00 · 404 阅读 · 0 评论 -
Shellcoders Programming Uncovered
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpHow hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is原创 2008-09-06 18:20:00 · 419 阅读 · 0 评论 -
Combating Spyware in the Enterprise
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpCombating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware cur原创 2008-09-09 22:32:00 · 409 阅读 · 0 评论 -
Computer Security Basics
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.youkuaiyun.com/topmvp - topmvpThis is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you原创 2008-09-26 22:32:00 · 422 阅读 · 0 评论