303 75 6MB
English Pages 386 Year 2008
Report DMCA / Copyright
DOWNLOAD DJVU FILE
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and
392 88 5MB Read more
Security threats on mobile platforms are one of the key topics and main targets for the next couple of years, given the
409 71 5MB Read more
SEC401.2: Defense-in-Depth Overview To secure an enterprise network, you must understand the general principles of netwo
370 38 54MB Read more
Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Or
375 59 6MB Read more
This book is great if you develop websites, especially if you maintain a webserver. I am fairly well versed on basic sec
358 62 6MB Read more
372 56 6MB Read more
SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the In
421 74 44KB Read more
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is
363 103 7MB Read more
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for sever
740 113 3MB Read more
Individuals wishing to attack a company's network have found a new path of least resistance-the end user. A client-
293 25 4MB Read more