Related Books

Chained Exploits
Language: en
Pages: 474
Authors: Andrew Whitaker
Categories: Computers
Type: BOOK - Published: 2009-02-27 - Publisher: Pearson Education

DOWNLOAD EBOOK

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just
Inside the Security Mind
Language: en
Pages: 336
Authors: Kevin Day
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

DOWNLOAD EBOOK

A guide to managing the process of securing an enterprise network, covering all aspects from perimeter security to application security.
Guide to Vulnerability Analysis for Computer Networks and Systems
Language: en
Pages: 381
Authors: Simon Parkinson
Categories: Computers
Type: BOOK - Published: 2018-09-04 - Publisher: Springer

DOWNLOAD EBOOK

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerabilit
The Aerospace Supply Chain and Cyber Security
Language: en
Pages: 80
Authors: Kirsten M Koepsel
Categories: Technology & Engineering
Type: BOOK - Published: 2018-07-20 - Publisher: SAE International

DOWNLOAD EBOOK

The Aerospace Supply Chain and Cyber Security - Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technolog
Security and Privacy in Smart Sensor Networks
Language: en
Pages: 464
Authors: Maleh, Yassine
Categories: Computers
Type: BOOK - Published: 2018-05-09 - Publisher: IGI Global

DOWNLOAD EBOOK

Security and privacy protection within computer networks can be a challenge. By examining the current problems and challenges this domain is facing, more effici