Rootkits For Dummies

Rootkits For Dummies

A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user…

Securing Ajax Applications

Securing Ajax Applications

Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them…

Securing VoIP Networks

Securing VoIP Networks

In Securing VoIP Networks,two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security…

Security Metrics

Security Metrics

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover…

Disassembling Code: IDA Pro and SoftICE

Disassembling Code: IDA Pro and SoftICE

This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize different elements of disassembled code in order to debug applications in less time. Also described are the basics of Assembly language programming (MASM) and the…

Network Security Hacks, 2nd Edition

Network Security Hacks, 2nd Edition

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both…

PGP & GPG

PGP & GPG

OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys. PGP & GPG is an easy-to…

Network Security Bible

Network Security Bible

* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security * Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the…

Computer Viruses For Dummies

Computer Viruses For Dummies

Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Remember, if you…