Brief Contents: Introduction to Windows Server 2003 Security; Planning and Configuring Security Policies; Deploying and Managing Security Policies; Troubleshooting Security Policies; Planning and...
This book includes: Ethics of Hacking and Cracking; Reconnaissance; Scanning Tools; Sniffers; TCP/IP Vulnerabilities; Encryption and Password Cracking; Spoofing; Session Hijacking; Hacking Network...
This book provides a management overview of information security and a through treatment of the administration of information security. It can be used to support course delivery for information...
This book provides an overview of contingency operrations- including its components and a thorough treatment of the administration of the planning process for incident response, disaster recovery,...
This book provides a broad review of the entrire field of infomation security, background on many related elements, and enough detail to faciliate an understanding of the topic as a whole. The book...
This book is a programmer's guide to developing secure code. It was Written from a developer's perspective to help pthers enter into the dynamic field of software construction. The information and...
Contents: Information Security Fundamentals; Attackers and Their Attacks; Security Basics; Security Baselines; Securing the Network Infrastructure; Web Security; Protecting Advanced Communications;...
This book provides the right mix of theoretical concepts and practical software security programming and will be highly valuable for anyone who wants to get started in the field of software security....