eBooks-it.org Logo
eBooks-IT.org Inner Image

Syngress eBooks Page 32

Download free Syngress eBooks Page 32

CISSP Study Guide

CISSP Study Guide Image
The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The10 domains are covered completely and as concisely as possible with an eye to passing the exam thr first time. Each of the 10 domains has its own chapter that includes specially-designed pedagogy to aid you in passing the exam.Clearly Stated Exam ObjectivesUnique Terms / DefinitionsExam WarningsHelpful NotesLearning By ExampleStepped Chapter Ending QuestionsSelf Test AppendixDetailed GlossaryWeb Site (http://booksite.syngress.com/companion/conrad) Contains Two Practice Exams and Ten Podcasts-One for Each Domain...

Buffer Overflow Attacks

Detect, Exploit, Prevent
Buffer Overflow Attacks Image
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflo...

Bluetooth Application

Developer's Guide
Bluetooth Application Image
"Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner GroupBluetooth is the most exciting development in wireless computing this decade! Bluetooth enabled devices can include everything from network servers, laptop computers and PDAs, to stereos and home security systems. Most Bluetooth products to hit the market in 2001 will be PC cards for laptop computers and access points, which allow up to seven Bluetooth devices to connect to a network. Reports indicate that by the end of 2003 there will be over 2 billion Bluetooth-enabled devices.Bluetooth-enabled devices communicate with each other through embedded software applications. Bluetooth Developer's Guide to Embedded Application...

Asterisk Hacking

Asterisk Hacking Image
Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot!This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack! * Asterisk Live CD containing all the tools discussed in the book and ready to boot!* Contains original code to perfor...

Aggressive Network Self-Defense

Aggressive Network Self-Defense Image
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. *First book to demonstrate and explore controversial network strike back and countermeasure techniques. *Provides tightly guarded secrets to find out...


2007 - 2017 © eBooks-IT.org