Computer virusesーjust the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cybe……続きを見る
Do you like wandering naked in public? Probably not. But what about being watched while you’re browsing the Internet? Or if everyone can read your emails? Not a pleasant thought. Well, here is the b……続きを見る
The charismatic forger immortalized in Catch Me If You Can exposes the astonishing tactics of today’s identity theft criminals and offers powerful strategies to thwart them based on his second caree……続きを見る
This book provides you with an insider's grasp about ppc, google pay per click, ppc services, ppc marketing, ppc traffic and profit machine, ppc made simple and much more.
続きを見る
Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be ta……続きを見る
Young people spend hours online each day, and their abilities to multitask and communicate are often misunderstood by older generations. Dr. Larry Rosen offers a full overview of the various issues ……続きを見る
著者:J. J. Luna
出版社: St. Martin's Publishing Group
発売日: 2012年07月17日
"Fascinating... a regular field manual... meticulously researched and very entertaining." --G. Gordon Liddy
A thoroughly revised and updated edition of the essential guide to preserving your persona……続きを見る
Despite the fact that the government has aggressively turned out laws to regulate identity theft, the crime continues to be a prevalent concern in both the cyber world and the real world.
Identit……続きを見る
An introduction to designing and configuring Cisco IPsec VPNs
Understand the basics of the IPsec protocol and learn implementation best practices
Study up-to-date IPsec design, incorporating current……続きを見る
In diesem Buch geht es um kleine Rechner, die unbeaufsichtigt im Dauerbetrieb laufen, die meist keine Tastatur und keinen Bildschirm haben, die da sind und das machen, wofür sie gebaut sind. Die nic……続きを見る
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, po……続きを見る
著者:Ken Klein
出版社: Sustainable Alternatives, LLC
発売日: 2011年04月12日
Learn To Make Strong Passwords You Can Remember - Learn how to make strong memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different pas……続きを見る
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of ……続きを見る
This book provides an overview of the Authorizing Official (AO) role in the Risk Management Framework (RMF) process, discusses implications of performing AO duties and emphasizing RMF as a continuou……続きを見る
著者:Jeffrey Hunker
出版社: McClelland & Stewart
発売日: 2010年08月24日
The Internet is often called a superhighway, but it may be more analogous to a city: an immense tangle of streets, highways, and interchanges, lined with homes and businesses, playgrounds and theatr……続きを見る
Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another o……続きを見る
著者:Will Iverson
出版社: O'Reilly Media
発売日: 2009年02月09日
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, b……続きを見る
The book is a collection of easy to follow, practical recipes with explanations of the code, and links to further information. This book is for any security consultant, administrator or enthusiast l……続きを見る
If you are reading this, it's a pretty good bet that the "Gotcha" grabbed your attention. If it did, great! If you arrived here by some other means, you made a wise decision. Find out why as you rea……続きを見る
Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves……続きを見る
This book is an introduction to writing Linux shell scripts and installation of certain important tools for industry usage.
Topics included are the use of commands and shortcuts in shell scripting, ……続きを見る
Poznaj i wykorzystaj mechanizmy testowania zabezpiecze?, a nikt nie prze?lizgnie si? przez Twoj? witryn?!
Jak zainstalowa? i skonfigurowa? narz?dzia do testo
続きを見る
著者:Ivan Ristic
出版社: O'Reilly Media
発売日: 2009年02月16日
With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers ……続きを見る
This Volume contains two complete books.
USING C IN SOFTWARE DESIGN, 2E
Originally published in 1993, this book provides a creative approach to learning the C programming language by emphasizing sof……続きを見る
Parents today have double the hassle of taking care of their child. Not only do you keep an eye on them in the real world, now you need to look out for their goings on in the internet world as well.……続きを見る
著者:Steve W Roche
出版社: Steve W Roche
発売日: 2015年05月09日
Are you one of those parents for whom the Internet, video games and mobile phones are foreign territory? If so, this is the wake up call you need. Children and teenagers know their way around these ……続きを見る
Cisco ASA, PIX, and FWSM Firewall Handbook, Second Edition, is a guide for the most commonly implemented features of the popular Cisco® firewall security solutions. Fully updated to cover the latest……続きを見る
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new t……続きを見る
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how d……続きを見る