Télécharger le livre :  The Shellcoder's Handbook
Ajouter à ma liste d'envies
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that...

Editeur : Wiley
Parution : 2007-11-05

PDF, ePub

49,58
Télécharger le livre :  IT Security Interviews Exposed
Ajouter à ma liste d'envies
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's...

Editeur : Wiley
Parution : 2007-10-15

PDF

28,80
Télécharger le livre :  Biorthogonal Systems in Banach Spaces
Ajouter à ma liste d'envies
One of the fundamental questions of Banach space theory is whether every Banach space has a basis. A space with a basis gives us the feeling of familiarity and concreteness, and perhaps a chance to attempt the classification of all Banach spaces and other problems. The...

Editeur : Springer
Parution : 2007-10-04
Collection : CMS Books in Mathematics
PDF

70,92
Télécharger le livre :  Cryptology Unlocked
Ajouter à ma liste d'envies
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style.Cryptology Unlocked explains encryption, crypto...

Editeur : Wiley
Parution : 2007-08-20

PDF

44,31
Télécharger le livre :  Applied Cryptanalysis
Ajouter à ma liste d'envies
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA...

Editeur : Wiley-IEEE Press
Parution : 2007-06-15
Collection : IEEE Press
PDF

133,93
Télécharger le livre :  The Oracle Hacker's Handbook
Ajouter à ma liste d'envies
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Editeur : Wiley
Parution : 2007-03-31

PDF

43,15
Télécharger le livre :  Computer Security and Cryptography
Ajouter à ma liste d'envies
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough...

Editeur : Wiley-Interscience
Parution : 2007-03-07

PDF

160,31
Télécharger le livre :  Managing Safety
Ajouter à ma liste d'envies
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...

Editeur : Wiley-VCH
Parution : 2007-02-27

PDF

116,00
Télécharger le livre :  Network Security Foundations
Ajouter à ma liste d'envies
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...

Editeur : Sybex
Parution : 2006-02-20

PDF

24,05
Télécharger le livre :  Information Security
Ajouter à ma liste d'envies
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...

Editeur : Wiley-Interscience
Parution : 2005-11-11

PDF

94,90
Télécharger le livre :  Spies Among Us
Ajouter à ma liste d'envies
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Editeur : Wiley
Parution : 2005-04-01

PDF

25,32
Télécharger le livre :  The Art of Intrusion
Ajouter à ma liste d'envies
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2005-01-26

PDF, ePub

16,35
Télécharger le livre :  Computer Viruses For Dummies
Ajouter à ma liste d'envies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2004-08-26

PDF, ePub

17,30
Télécharger le livre :  Malicious Cryptography
Ajouter à ma liste d'envies
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Editeur : Wiley
Parution : 2004-07-30

PDF

43,25
Télécharger le livre :  Mission-Critical Security Planner
Ajouter à ma liste d'envies
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...

Editeur : Wiley
Parution : 2003-02-13

PDF

52,75
Télécharger le livre :  Hack Attacks Testing
Ajouter à ma liste d'envies
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...

Editeur : Wiley
Parution : 2003-02-05

PDF

48,00
Télécharger le livre :  Biometrics
Ajouter à ma liste d'envies
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...

Editeur : Wiley
Parution : 2002-04-29
Collection : Technology Briefs Series
PDF

40,62
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...

Editeur : Wiley
Parution : 2001-09-18

PDF, ePub

16,88
<< < 101112