Securing Ajax Applications
Rootkits For Dummies
Hacking Exposed Web 2.0
Hacking, 2nd Edition
Hacking VoIP
The Myths of Security
Security Monitoring
Practical Intrusion Analysis
Hacking Exposed, 6th Edition
Fragile networks
Cloud Security and Privacy
Beautiful Security
Hackers
The IDA Pro Book
Securing VoIP Networks
In Securing VoIP Networks,two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer pro ...
Securing Ajax Applications
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed r ...
Rootkits For Dummies
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Hacking Exposed Web 2.0
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
Reverse Engineering Code with I ...
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. H ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet a ...
Hacking Exposed Linux, 3rd Edit ...
This authoritative guide will help you secure your Linux network – whether you use Linux as a desktop OS, for Internet services, for telecommunication ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
Practical Intrusion Analysis
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. ...
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following t ...
Hacking Exposed Malware and Roo ...
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the “black art” of malware and rootkits. You wi ...
Hacking Exposed Computer Forens ...
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, ...
Fragile networks
A unified treatment of the vulnerabilities that exist in real-world network systems-with tools to identify synergies for mergers and acquisitions Frag ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Protecting Your Mobile App IP: ...
Learn four cost – effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won’t s ...
Hacking Exposed Wireless, 2nd E ...
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover ...
Hacking Exposed Web Application ...
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today’s hacker. Written by recognized security ...
Hackers
Steven Levy’s classic book about the original hackers of the computer revolution is now available in a special 25th anniversary edition, with updated ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
The IDA Pro Book
No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the mi ...