eBooks-it.org Logo
eBooks-IT.org Inner Image

CompTIA eBooks

Download free CompTIA eBooks

Hardware-based Computer Security Techniques to Defeat Hackers

From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers Image
Presents primary hardware-based computer security approaches in an easy-to-read toolbox formatProtecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:CryptographyKey generation and distributionThe qualities of security solutionsSecure co-processorsSecure bootstrap loadingSecure memory management and trusted executio...

A+ Certification

For Dummies
A+ Certification Image
3rd Edition
Prepping for the A+ certification exam is not an easy challenge, but in order to become a certified computer technician, passing this test is a requirement. The good news is you only have to take it once in your life to become certified.A+ Certification For Dummies 3rd Edition is a no-nonsense, easy-to-use reference and study guide for the A+ Core Hardware exam and the OS Technologies exam! It focuses on all the things you need to know to pass these tests, providing background information to help you understand some of the more complex concepts and technologies. You'll have a handle on all the subjects, including:The anatomy of a computerBuilding and d...

Maximum Apache Security

Maximum Apache Security Image
Many of the high-profile attacks on prominent Web sites of the last couple years are a direct result of poor Web site or Web application security. With more than 65 percent of Web sites using the Apache Web server and the Apache-based open source Web development environment and with the risk of sabotage greater than ever Apache administrators and developers need to know how to build and maintain secure Web servers and Web applications. Yet most of the currently available Apache books lack detailed information on important Web administration topics like security. Maximum Apache Security details the complex security weaknesses and risks of Apache, and provides hands-on solutions for keeping a Web site secure and buttressed against intruders. It include...

Web Security Testing Cookbook

Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook Image
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Recipes cover the basics from observing messages between clients and servers to multi-phase tests that script the login and execution of web application features. By the end of the book, you'll be able to build tests pinpointed at Ajax functions, as well as large multi-step t...

The Myths of Security

What the Computer Security Industry Doesn't Want You to Know
The Myths of Security Image
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time to understand the situation and protect themselves accordingly. This book tells you:Why it's easier for bad guys to "own" your computer than you think Why a...


2007 - 2017 © eBooks-IT.org