Related Books
Language: en
Pages: 412
Pages: 412
Type: BOOK - Published: 2006-12-02 - Publisher: Elsevier
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all th
Language: en
Pages: 400
Pages: 400
Type: BOOK - Published: 2004-03-19 - Publisher: "O'Reilly Media, Inc."
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released
Language: en
Pages: 243
Pages: 243
Type: BOOK - Published: 2018-08-31 - Publisher: Packt Publishing Ltd
Build a network security threat model with this comprehensive learning guide Key Features Develop a network security threat model for your organization Gain han
Language: en
Pages: 1433
Pages: 1433
Type: BOOK - Published: 2006-11-20 - Publisher: Pearson Education
The Definitive Insider’s Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing
Language: en
Pages: 599
Pages: 599
Type: BOOK - Published: 2020-06-03 - Publisher: Springer Nature
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer net