Networking category: 4555 books

Cover of Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
by Clint Bodungen, Bryan Singer, Aaron Shbeeb
Language: English
Release Date: September 22, 2016

Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical...
Cover of Computer Forensics with FTK
by Fernando Carbone
Language: English
Release Date: March 20, 2014

This tutorial contains detailed instructions with useful integrated examples that help you understand the main features of FTK and how you can use it to analyze evidence. This book has clear and concise guidance in an easily accessible format. This tutorial-based guide is great for you if you want to...
Cover of Meeting People via WiFi and Bluetooth
by Joshua Schroeder, Henry Dalziel
Language: English
Release Date: December 9, 2015

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015...
Cover of Kali Linux 2: Windows Penetration Testing
by Wolf Halton, Bo Weaver
Language: English
Release Date: June 28, 2016

Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize...
Cover of Mastering Kali Linux Wireless Pentesting
by Jilumudi Raghu Ram, Brian Sak
Language: English
Release Date: February 25, 2016

Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux About This Book Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks Perform...
Cover of Cybersecurity for Everyone

Cybersecurity for Everyone

Securing your home or small business network

by Terence L. Sadler
Language: English
Release Date: December 10, 2014

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business. - Identity Theft. According to the Symantec Internet...
Cover of Hyper-V Security
by Eric Siron, Andy Syrewicze
Language: English
Release Date: December 26, 2014

Hyper-V Security is intended for administrators with a solid working knowledge of Hyper-V Server, Windows Server, and Active Directory. An administrator with a functional environment will be able to use the knowledge and examples present in this book to enhance security.
Cover of Essential Cybersecurity Science

Essential Cybersecurity Science

Build, Test, and Evaluate Secure Systems

by Josiah Dykstra
Language: English
Release Date: December 8, 2015

If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific experiments...
Cover of 2018 Best Resources for Apps Development
by Antonio Smith
Language: English
Release Date: May 3, 2018

This reference is loaded with necessary resources useful to app designers and developers or those with interest thereof. Get expert advice on app designs and development. Inside you will find trade journals and magazines, educational resources and professional business tools to assist you from initial...
Cover of Digital-Forensics and Watermarking

Digital-Forensics and Watermarking

12th International Workshop, IWDW 2013, Auckland, New Zealand, October 1-4, 2013. Revised Selected Papers

by
Language: English
Release Date: July 8, 2014

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Digital-Forensics and Watermarking, IWDW 2013, held in Auckland, New Zealand, during October 2013. The 24 full and 13 poster papers, presented together with 2 abstracts, were carefully reviewed and...
Cover of Security Monitoring

Security Monitoring

Proven Methods for Incident Detection on Enterprise Networks

by Chris Fry, Martin Nystrom
Language: English
Release Date: February 9, 2009

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping...
Cover of Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
by Daniel Regalado, Shon Harris, Allen Harper
Language: English
Release Date: April 5, 2018

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition...
Cover of Security in Computing
by Charles P. Pfleeger, Shari Lawrence Pfleeger, Jonathan Margulies
Language: English
Release Date: January 14, 2015

The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of Things, and Cyberwarfare   Students and IT and security professionals have long relied on Security in Computing as the definitive guide to computer security attacks and countermeasures. Now,...
Cover of Living with Linux in the Industrial World
by Elaiya Iswera Lallan
Language: English
Release Date: January 7, 2013

This book is an introduction to writing Linux shell scripts and installation of certain important tools for industry usage. Topics included are the use of commands and shortcuts in shell scripting, monitoring of memory and CPU usages, SSL implementation, packet tracing and webservers in linux environment....
First 77 78 79 80 81 82 8384 85 86 87 88 89 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy