Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.
Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.
Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.
Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.
A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.
Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.
Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.
Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.
Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
A book for multi-tasked IT managers responsible for securing the version of SQL Server 2005. It provides the multi-tasked Sys Admin with the useful information needed to perform the daily tasks. It covers SQL Server 2005, which is a massive product with significant challenges for IT managers. It emphasizes best-practice security measures.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.