Hidden fields
Books Books

The Ethical Hack: A Framework for Business Value Penetration Testing

James S. Tiller - Business & Economics - 2004 - 350 pages
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be ...
Limited preview - About this book

Hacker Techniques, Tools, and Incident Handling

Sean-Philip Oriyano, Michael Gregg - Business & Economics - 2011 - 416 pages
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers ...
Limited preview - About this book

Computer Security Sourcebook

Wilma Caldwell - Computer networks - 2003 - 536 pages
Documents and excerpts from government publications, and copyrighted documents from private sources provide general users of computers information and insight into computer ...
Snippet view - About this book

Principles and Practice of Information Security: Protecting Computers from ...

Linda Volonino, Stephen R. Robinson, Charles P. Volonino - Computers - 2004 - 268 pages
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security ...
Snippet view - About this book

Encyclopedia of Cybercrime

Samuel C. McQuade - Computers - 2009 - 240 pages
No preview available - About this book

Information Security Management Handbook, Fourth Edition, Volume 2

Harold F. Tipton - Computers - 2000 - 640 pages
The runaway growth of computer viruses and worms and the ongoing nuisance posed by malicious hackers and employees who exploit the security vulnerabilities of open network ...
Limited preview - About this book

Fund.Of Network Security

Maiwald - 2010 - 686 pages
No preview available - About this book

Advanced Persistent Threat: Understanding the Danger and How to Protect Your ...

Eric Cole - Computers - 2012 - 320 pages
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is ...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search