Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the executi
在线阅读本书 As the cliché reminds us, information is power. In this age of computer systems and technolo
在线阅读本书 Microsoft hails the latest version of its flagship server operating system, Windows Server 2
This book will teach the reader how to make the most of their WRT54G series hardware. These handy li
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cel
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines st
Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then
Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you nee
This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as wel
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the
Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? T
The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to i
Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications
Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Th
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then y
在线阅读本书 One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is
The number of security countermeasures against user-land exploitation is on the rise. Because of thi
Enrico Perla B.Sc.Computer Science University of Torino M.Sc.Computer Science Trinity College Dublin
Microsoft Virtualization helps you understand and implement the latest virtualization strategies ava