Data protection
Security engineering : a guide to building dependable distributed systems
This book is divided into three parts: The first looks at basic concepts, starting with the central concept of a security protocol, and going on to human-computer interface issues, access controls, cryptology, and distributed system issues; The second part looks in much more detail at a number of ...
- Vị trí lưu trữ: 03 Quang Trung
- Tổng sách: 1
- Đang rỗi: 1
1. Is there a security problem in computing?; 2.Basic encryption and decryption; 3. Secure encryption systems; 4. Using encryption; 5. Protocols and practices; Program security; 6. Protection in general-purpose operating systems; 7. Designing trusted operating systems; 8. Data base security; ...
- Vị trí lưu trữ: Tồn kho (03 Quang Trung)
- Tổng sách: 1
- Đang rỗi: 1
Web hacking : attacks and defense
Features include: Overview of the Web and what hackers go after; Complete Web application security methodologies; Detailed analysis of hack techniques; Countermeasures ;What to do at development time to eliminate vulnerabilities: New case studies and eye-opening attack scenarios; vanced Web hacking ...
- Vị trí lưu trữ: 03 Quang Trung
- Tổng sách: 1
- Đang rỗi: 1
Hacking: The art of exploitation
In Hacking: the art of exploitation you will learn how to: Exploit programs using buffer overflows and format strings; Write your own printable ASCII polymorphic shellcode; Defeat non-executable stacks by returning into libc; Redirect network traffic, conceal open posts, and hijack TCP connections; ...
- Vị trí lưu trữ: 03 Quang Trung
- Tổng sách: 1
- Đang rỗi: 1
Know your enemy: Learning about security threats: 2nd edition
This book will be an extremely useful tool in helping a network security administrator or professional assemble the technical tools needed to build, maintain, analyze, and learn from a honeynet within their organization. Each technical chapter goes into great detail on commands, log formats, ...
- Vị trí lưu trữ: 03 Quang Trung
- Tổng sách: 1
- Đang rỗi: 1