eBooks-it.org Logo
eBooks-IT.org Inner Image

Syngress eBooks Page 30

Download free Syngress eBooks Page 30

Eleventh Hour CISSP

Study Guide
Eleventh Hour CISSP Image
The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.The only guide you need for last-minute studyingAnswers the toughest questions and highlights core topicsCan be paired with any other study guide so you are completely prepared...

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security Image
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing a secure Web application. Through a review of recent Web application breaches, the book will expose the prolific methods hackers use to execute Web attacks using com...

Designing a Wireless Network

Designing a Wireless Network Image
Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.Designing Wireless Networks provides the necessary information on how to design and implement a wireless network. Beginning with detailed descriptions of the various implementations and architectures of wireless technologies and moving to the step-by-step instructions on how to install and deploy a fixed wireless network; this book ...

Cryptography for Developers

Cryptography for Developers Image
The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes in-depth discussion on memory/size/speed performance trade-offs as well as what cryptographic problems are solved with the specific topics at hand. * The author is the developer of the indust...

Consumer's Guide to Cell Phones & Wireless Service Plans

Consumer's Guide to Cell Phones & Wireless Service Plans Image
Choosing the right mobile phone and service plan can be overwhelming, particularly if you travel abroad - this truly international guide is ideal for the mobile executiveExperts estimate that by 2005 there will be over 1.26 billion wireless phone users around the world. (Source: Cellular Telecommunications Industry Association). It's overwhelming to think of the options available to the consumer when it comes to buying mobile phones, phone accessories, and service plans. So many people are confused by the myriad of wireless phone claims, the endless advertised rates and the countless service plans with all their options. The Consumer's Guide to Cell Phones is designed to help consumers choose what program may best suit them. This book helps streamlin...



2007 - 2017 © eBooks-IT.org