Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.
Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.
Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.
Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.
Over 95 per cent of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service (WSUS) is designed to provide patches and updates to every one of these computers. This book begins by describing the feature set of WSUS, and the benefits it provides to system administrators.
Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.
Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.
Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. This book helps you discover the best ways to defend against these vicious hacks with step-by-step instructions and techniques to make your computer and network impenetrable.
Keyed to the XK0-003 revision of the CompTIA Linux+exam, this book is streamlined to include only core certification information and is presented for ease of last-minute studying. It covers the main objectives of the exam with key concepts highlighted. It also includes 'Top Five toughest questions and answers to help you to prepare.
Covers the main objectives of CompTIA Network+ exam, highlighting key concepts. This title features Exam Warnings that highlight particularly tough sections of the exam. It includes review of five toughest questions by topic.
Focuses on the essentials needed to pass the Security+ certification exam. The book includes: Exam Objectives - Fast Track Review; Key words/definitions; Five Toughest questions and their answers; and, Exam Warnings - What to pay attention to. It also includes review of five toughest questions by topic.
Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing the 'Top 10' security logs that IT professionals should be regularly analyzing.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.