A+, Network+, Security+ Exams in a Nutshell
by Pawan K. Bhardwaj
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. Its concise easy-to-use format provides all the information you need to get ready for the exams, including the four new A+ exams - the required Essentials exam and three elective exams that pertain to your area of specialization....
Price: $5.00 | Publisher: O'Reilly Media | Release: 2007
Hacking Exposed Windows, 3rd Edition
by Joel Scambray
Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, an...
Price: $40.42 | Publisher: McGraw-Hill | Release: 2007
by Rich Cannings, Himanshu Dwivedi, Zane Lackey
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plu...
Price: $7.39 | Publisher: McGraw-Hill | Release: 2007
by Andrew Jaquith
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure secu...
Price: $39.56 | Publisher: Addison-Wesley | Release: 2007
by Bryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac...
Price: $43.53 | Publisher: O'Reilly Media | Release: 2007
Network Security Assessment, 2nd Edition
by Chris McNab
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack....
Price: $7.94 | Publisher: O'Reilly Media | Release: 2007
by Chris Andrade, Shawn Livermore, Mike Meyers, Scott Van Vliet
If you want to learn how to build killer user interfaces for Windows and the web, then this book is for you. It arms you with the tools and code you'll need to effectively utilize the Windows Presentation Foundation (WPF). From creating appealing graphics and animated structures to enhancing performance and security, you'll be programming in no time.First you'll explore the WPF framework and ...
Price: $4.95 | Publisher: Wrox | Release: 2007
by Larry Stevenson, Nancy Altholz
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, c...
Price: $7.55 | Publisher: Wiley | Release: 2007
by Brad Ediger
This is the book for experienced Rails developers who want to go to the next level with this web development framework, with an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and techniques used within the Rails framework itself, but also how make use of ideas borrowed from other program...
Price: $9.99 | Publisher: O'Reilly Media | Release: 2007
by David A. Karp
Windows Vista may be the next big thing, but it still contains enough quirks and unaccountable behaviors to vex anyone. This unique guide not only discusses the most irritating features of the latest Microsoft operating system and how to get around them, but also explains how to improve Windows and do more with the software than Microsoft intended. You'll find information on setup, installation, upgrad...
Price: $3.88 | Publisher: O'Reilly Media | Release: 2007