The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)
The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder)
The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
IT Security Cookbook (Sean Boran)
IT Security Cookbook (Sean Boran)
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
O'Reilly Security Books Chapters
O'Reilly Security Books Chapters
Building Secure ASP.NET Applications Authentication, Authorization, and Secure Communication
Building Secure ASP.NET Applications Authentication, Authorization, and Secure Communication
The .NET Developers Guide to Windows Security (K. Brown)
The .NET Developers Guide to Windows Security (K. Brown)
Building Internet Firewalls (D.B, Chapman E.D. Zwicky) Mirror
Building Internet Firewalls (D.B, Chapman E.D. Zwicky) Mirror
Hacking exposed: Network security secrets and solutions
A lot of computer-security textbooks approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane's-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.
Handbook of Information Security Management (M. Krause, H. F. Tipton) Mirror - Free eBook Handbook of Information Security Management (M. Krause, H. F. Tipton) Mirror - Download ebook Handbook of Information Security Management (M. Krause, H. F. Tipton) Mirror free
|