Security related eBooks
2009 | 312 Pages | ISBN: 0137012330 | PDF | 2 MB Solaris 10 Security Essentials describes the various security technologies contained in the Solaris operating system. The book describes how to make in...
( Category:Security related Date:09 Mar 2015 )
Download: http://longfiles.com/f3m3qwj8upxo/Corporate_Computer_Security_(3rd_Edition).pdf.html...
( Category:Security related Date:09 Mar 2015 )
English | Oct 23, 2005 | ISBN: 0596101155 | 328 Pages | CHM | 2 MB The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advanta...
( Category:Security related Date:08 Mar 2015 )
Publisher: Auerbach Publications; 1 edition | 2007-06-07 | 292 Pages | ISBN: 0849392519 | PDF | 2 MB The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible d...
( Category:Security related Date:06 Mar 2015 )
English | 2010 | ISBN: 0071701095 | 464 pages | PDF | 8,6 MB Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authorit...
( Category:Security related Date:06 Mar 2015 )
English | Mar 1, 2004 | ISBN: 059600611X | 396 Pages | CHM | 1 MB There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exp...
( Category:Security related Date:06 Mar 2015 )
Publisher: Wiley | 2002-11-06 | 561 Pages | ISBN: 0471229466 | PDF | 12.77 MB Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a...
( Category:Security related Date:05 Mar 2015 )
English | 2004 | ISBN: 3540213767 | 469 Pages | PDF | 13 MB This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, I...
( Category:Security related Date:05 Mar 2015 )
English | Mar 3, 2015 | ASIN: B00U87Y7Y0 | 170 Pages | EPUB/PDF (Converted) | 1.49 MB Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing...
( Category:Security related Date:04 Mar 2015 )
English | May 30, 2005 | ISBN: 0321336437 | 608 Pages | CHM | 7 MB Johansson and Riley's new book presents complex issues in straightforward language, examining both the technical and business aspects...
( Category:Security related Date:04 Mar 2015 )
2014 | 124 Pages | ISBN: 3319122258 | PDF | 2 MB This volume illustrates the continuous arms race between attackers and defenders of the Web ecosystem by discussing a wide variety of attacks. In the f...
( Category:Security related Date:03 Mar 2015 )
English | ISBN: 1784396435 | 2015 | 208 pages | PDF, EPUB | 10 + 15 MB Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi About This Book Lea...
( Category:Security related Date:03 Mar 2015 )
English | ISBN: 1782163182 | 2015 | 220 pages | PDF, EPUB | 12 + 20 MB Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals About This Book Cond...
( Category:Security related Date:03 Mar 2015 )
English | 2013 | ISBN-10: 1439877300 | 267 pages | PDF | 10 MB The Complete Book of Data Anonymization: From Planning to Implementation supplies a 360-degree view of data privacy protection using data...
( Category:Security related Date:01 Mar 2015 )
Published: 2012-04-27 | ISBN: 1447140656 | PDF | 82 pages | 0.6 MB Within the last decade, the Internet has developed as a phenomenon encompassing social, cultural, economic and legal facets. It has b...
( Category:Security related Date:01 Mar 2015 )