|
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that...
Editeur :
Wiley
Parution :
2007-11-05
PDF, ePub
|
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's...
Editeur :
Wiley
Parution :
2007-10-15
PDF
|
One of the fundamental questions of Banach space theory is whether every Banach space has a basis. A space with a basis gives us the feeling of familiarity and concreteness, and perhaps a chance to attempt the classification of all Banach spaces and other problems.
The...
Editeur :
Springer
Parution :
2007-10-04
Collection :
CMS Books in Mathematics
PDF
|
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style.Cryptology Unlocked explains encryption, crypto...
Editeur :
Wiley
Parution :
2007-08-20
PDF
|
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA...
Editeur :
Wiley-IEEE Press
Parution :
2007-06-15
Collection :
IEEE Press
PDF
|
David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...
Editeur :
Wiley
Parution :
2007-03-31
PDF
|
Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough...
Editeur :
Wiley-Interscience
Parution :
2007-03-07
PDF
|
What are accidents? Are they just statistics that your safety department sends to you monthly and which you glance over and ask yourself whether the safety professional you have employed is doing his job right? Aimed primarily at top and middle management, this book...
Editeur :
Wiley-VCH
Parution :
2007-02-27
PDF
|
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...
Editeur :
Sybex
Parution :
2006-02-20
PDF
|
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...
Editeur :
Wiley-Interscience
Parution :
2005-11-11
PDF
|
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...
Editeur :
Wiley
Parution :
2005-04-01
PDF
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2005-01-26
PDF, ePub
|
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...
Editeur :
For Dummies
Parution :
2004-08-26
PDF, ePub
|
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...
Editeur :
Wiley
Parution :
2004-07-30
PDF
|
Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...
Editeur :
Wiley
Parution :
2003-02-13
PDF
|
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an...
Editeur :
Wiley
Parution :
2003-02-05
PDF
|
An insight into the biometric industry and the steps for successful deployment Biometrics technologies verify identity through characteristics such as fingerprints, voices, and faces. By providing increased security and convenience, biometrics have begun to see...
Editeur :
Wiley
Parution :
2002-04-29
Collection :
Technology Briefs Series
PDF
|
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...
Editeur :
Wiley
Parution :
2001-09-18
PDF, ePub
|