The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
The Opensource PKI Book, by Symeon (Simos) Xenitellis Mirror
IT Security Cookbook (Sean Boran)
IT Security Cookbook (Sean Boran)
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
Intrusion Detection Systems (IDS) with Snort Advanced IDS with Snort, Apache, MySQL, PHP, and ACID Mirror
O'Reilly Security Books Chapters
O'Reilly Security Books Chapters
Building Secure ASP.NET Applications Authentication, Authorization, and Secure Communication
Building Secure ASP.NET Applications Authentication, Authorization, and Secure Communication
The .NET Developers Guide to Windows Security (K. Brown)
The .NET Developers Guide to Windows Security (K. Brown)
Building Internet Firewalls (D.B, Chapman E.D. Zwicky) Mirror
Building Internet Firewalls (D.B, Chapman E.D. Zwicky) Mirror
Hacking exposed: Network security secrets and solutions
A lot of computer-security textbooks approach the subject from a defensive point of view. "Do this, and probably you'll survive a particular kind of attack," they say. In refreshing contrast, Hacking Exposed, Second Edition talks about security from an offensive angle. A Jane's-like catalog of the weaponry that black-hat hackers use is laid out in full. Readers see what programs are out there, get a rundown on what the programs can do, and benefit from detailed explanations of concepts (such as wardialing and rootkits) that most system administrators kind of understand, but perhaps not in detail. The book also walks through how to use the more powerful and popular hacker software, including L0phtCrack. This new edition has been updated extensively, largely with the results of "honeypot" exercises (in which attacks on sacrificial machines are monitored) and Windows 2000 public security trials. There's a lot of new stuff on e-mail worms, distributed denial-of-service (DDoS) attacks, and attacks that involve routing protocols.
Network Security Secrets & Solutions
The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today�s most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.
The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder) - Free eBook The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder) - Download ebook The Protection of Information in Computer Systems (J.H. Saltzer and M.D. Schroeder) free
|