An example-driven guide to securing access to your applications with OpenID Connect, the OAuth-based identity layer that keeps billions of user interactions safe every day.Login security is a complex problem with a simple solution: Ope...Loe edasi...
This book talks about the theoretical frameworks, technical methodologies, Information security, and empirical research findings in the field to protect your computers and information from adversaries. Solution to secure data management issues for...Loe edasi...
Large language models (LLMs) are not just shaping the trajectory of AI, theyre also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Ex...Loe edasi...
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, the Kali Linux can also be...Loe edasi...
Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data poin...Loe edasi...
Data Exfiltration Threats and Prevention Techniques provides readers the knowledge needed to prevent and protect from malware attacks, raising awareness of the increasing number of attacks each year. Provided with a detailed description of the recen...Loe edasi...
With the increasing use of E-learning, technology has not only revolutionized the way corporate businesses operate but has also impacted the learning processes in the education sector. E-Learning is slowly replacing the traditional methods of teac...Loe edasi...
Cyberattacks are more destructive than ever, but your c-suite can stop them. This book tells you how.Cyberattacks are worse now than ever before. To defeat cybercriminals, companies must focus on the low-hanging fruits of cybersecu...Loe edasi...
OpenSSL is a library and application suite that enables software developers and other engineers to encrypt and decrypt data, use digital signatures, create and verify X.509 certificates, and make secure TLS connections. In this book, youll learn ho...Loe edasi...
This book explores how Nmap is one of the most robust tools for network discovery and security auditing. Youll focus on how you can use it to perform hundreds of different tasks, from OS detection and port scanning to advanced fingerprinting and vu...Loe edasi...
This volume LNCS 13582 constitutes the papers of the 19th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2022, held in August 2022 in Vienna, Austria, as part of the DEXA 2022 conference. The 11 full...Loe edasi...
(Ilmumisaeg: 31-Aug-2016, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319321233)
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is g...Loe edasi...
Executing Windows Command Line Investigations targets cyber security practitioners that focus on digital forensics and incident response. These are the individuals that are ultimately responsible for executing critical tasks such as inciden...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Few topics are as pressing to policy makers, business leaders and the risk management community as the secure and compliant management of social media. Social Media Risk and Governance is a practical guide to the components and considerations which...Loe edasi...
(Ilmumisaeg: 08-Apr-2014, Paperback / softback, Kirjastus: John Wiley & Sons Inc, ISBN-13: 9781118662090)
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hackers Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into c...Loe edasi...
(Ilmumisaeg: 28-Nov-2012, Hardback, Kirjastus: SAP Press, ISBN-13: 9781592294374)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
1. Best Practices Unveiled2. Rights Framework3. Specific Rights4. Universe Security5. SAP NetWeaver BW, LDAP, and Active DirectoryHighlights Include: Dont talk to strangers—if only data security policies were this easy. Learn to keep yo...Loe edasi...
The Tangled Web is destined to be the definitive guide to web application security. Rather than simply enumerate known vulnerabilities or lay down a series of commandments from on high, famed security expert Michal Zalewski takes an in...Loe edasi...
(Ilmumisaeg: 08-Jan-2009, Paperback / softback, Kirjastus: Charles River Media, ISBN-13: 9781584506706)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Security measures are a critical piece of the game development process because they not only affect the player s ability to safely access and enjoy a game but a publisher s ability to profit from it. Protecting Games: A Security Handbook for Game Dev...Loe edasi...
Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate...Loe edasi...
(Ilmumisaeg: 27-Feb-2008, Multiple-component retail product, Kirjastus: Microsoft Press,U.S., ISBN-13: 9780735625044)
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
A definitive reference covering the fundamentals of administering the security features of Windows Server 2008 furnishes in-depth technical information and tools to protect Windows-based clients, server roles, networks, and Internet services, taking...Loe edasi...