6 livres(s)
Télécharger le livre :  The Reign of Botnets
Ajouter à ma liste d'envies

The Reign of Botnets


David Senecal


A top-to-bottom discussion of website bot attacks and how to defend against them In The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet, fraud and bot detection expert David Senecal delivers a timely and incisive presentation of the...

Parution : 2024-05-29
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Tech Today
J'achète
36,08
Télécharger le livre :  The Metrics Manifesto
Ajouter à ma liste d'envies

The Metrics Manifesto


Richard Seiersen


Security professionals are trained skeptics. They poke and prod at other people’s digital creations, expecting them to fail in unexpected ways. Shouldn’t that same skeptical power be turned inward? Shouldn’t practitioners ask: “How do I know that my enterprise security...

Parution : 2022-05-03
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
36,08
Télécharger le livre :  Unmasking the Social Engineer
Ajouter à ma liste d'envies

Unmasking the Social Engineer


Christopher Hadnagy


Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use...

Parution : 2014-01-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
33,76
Télécharger le livre :  The Oracle Hacker's Handbook
Ajouter à ma liste d'envies

The Oracle Hacker's Handbook


David Litchfield


David Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique...

Parution : 2007-03-31
Format(s) : PDF
Éditeur : Wiley
J'achète
43,15
Télécharger le livre :  Malicious Cryptography
Ajouter à ma liste d'envies

Malicious Cryptography


Adam Young , Moti Yung


Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Parution : 2004-07-30
Format(s) : PDF
Éditeur : Wiley
J'achète
43,25
Télécharger le livre :  Mission-Critical Security Planner
Ajouter à ma liste d'envies

Mission-Critical Security Planner


Eric Greenberg


Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost Includes worksheets at every stage for creating a comprehensive security plan...

Parution : 2003-02-13
Format(s) : PDF
Éditeur : Wiley
J'achète
52,75

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés