Related Books

Network Attacks and Exploitation
Language: en
Pages: 219
Authors: Matthew Monte
Categories: Computers
Type: BOOK - Published: 2015-07-07 - Publisher: John Wiley & Sons

GET EBOOK

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for deve
Network Attacks and Exploitation
Language: en
Pages: 231
Authors: Matthew Monte
Categories: Computers
Type: BOOK - Published: 2015-08-03 - Publisher: John Wiley & Sons

GET EBOOK

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for deve
Managing Cyber Threats
Language: en
Pages: 334
Authors: Vipin Kumar
Categories: Computers
Type: BOOK - Published: 2005-11-23 - Publisher: Springer Science & Business Media

GET EBOOK

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides co
Attacking Network Protocols
Language: en
Pages: 338
Authors: James Forshaw
Categories: Computers
Type: BOOK - Published: 2017-12-08 - Publisher: No Starch Press

GET EBOOK

Attacking Network Protocols is a deep dive into network protocol security from James ­Forshaw, one of the world’s leading bug ­hunters. This comprehensive g
Network Security Assessment
Language: en
Pages: 400
Authors: Chris McNab
Categories: Computers
Type: BOOK - Published: 2004-03-19 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released