|
|
libcats.org
Syngress Force Emerging Threat AnalysisMichael Gregg, Brian BaskinThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrows Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the best of this years top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..* From Practical VoIP Security, Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security.* From Phishing Exposed, Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam.* From Combating Spyware in the Enterprise, Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware.* Also from Combating Spyware in the Enterprise, About.coms security expert Tony Bradley covers the transformation of spyware.* From Inside the SPAM Cartel, Spammer-X shows how spam is created and why it works so well.* From Securing IM and P2P Applications for the Enterprise, Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security.* Also from Securing IM and P2P Applications for the Enterprise, Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security.* From RFID Security, Brad Renderman Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks.* Also from RFID Security, Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security.* From Hack the Stack, security expert Michael Gregg covers attacking the people layer.* Bonus coverage includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks.* The best of this year: Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats* Complete Coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more* Covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more
Популярные книги за неделю:
Проектирование и строительство. Дом, квартира, садАвтор: Петер Нойферт, Автор: Людвиг Нефф
Размер книги: 20.83 Mb
Система упражнений по развитию способностей человека (Практическое пособие)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 818 Kb
Сотворение мира (3-х томник)Автор: Петров Аркадий НаумовичКатегория: Путь к себе
Размер книги: 817 Kb
Радиолюбительские схемы на ИС типа 555Автор: Трейстер Р.Категория: Электротехника и связь
Размер книги: 13.64 Mb
Только что пользователи скачали эти книги:
Почему я не феминисткаАвтор: Хаткина НатальяКатегория: Русская классическая проза
Размер книги: 6 Kb
Semirings for Soft Constraint Solving and ProgrammingАвтор: Stefano BistarelliКатегория: CsLn_
Размер книги: 1.86 Mb
Religious Experience and Lay Society in T'ang China: A Reading of Tai Fu's 'Kuang-i chi' (Cambridge Studies in Chinese History, Literature and Institutions)Автор: Glen DudbridgeКатегория: История
Размер книги: 8.37 Mb
Invitation to Positive Psychology: Research and Tools for the ProfessionalАвтор: Robert Biswas-DienerКатегория: Психология
Размер книги: 346 Kb
Understanding Arguments: An Introduction to Informal Logic , Eighth EditionАвтор: Walter Sinnott-Armstrong, Автор: Robert J. Fogelin
Размер книги: 2.87 Mb
A Concordance to the Septuagint: And the Other Greek Versions of the Old Testament (Including the Apocryphal Books). Vol. 1. A-IАвтор: Edwin Hatch, Автор: Henry A Redpath
Размер книги: 112.03 Mb
Mad About Us: Moving from Anger to Intimacy with Your Spouse (Epub, Mobi & PDF)Автор: Gary Oliver, Автор: Carrie OliverКатегория: Christian
Размер книги: 2.17 Mb
|
|
|