Brief Contents: Introduction to Windows Server 2003 Security; Planning and Configuring Security Policies; Deploying and Managing Security Policies; Troubleshooting Security Policies; Planning and...
This book includes: Ethics of Hacking and Cracking; Reconnaissance; Scanning Tools; Sniffers; TCP/IP Vulnerabilities; Encryption and Password Cracking; Spoofing; Session Hijacking; Hacking Network...
This book includes: business transformation, IT security, and introduction to the firewall; TCP/IP technology for the internet and intranet; threats in networks; elements of a firewall system;...
This book provides a management overview of information security and a through treatment of the administration of information security. It can be used to support course delivery for information...
This book provides an overview of contingency operrations- including its components and a thorough treatment of the administration of the planning process for incident response, disaster recovery,...
This book provides a broad review of the entrire field of infomation security, background on many related elements, and enough detail to faciliate an understanding of the topic as a whole. The book...
This book is a programmer's guide to developing secure code. It was Written from a developer's perspective to help pthers enter into the dynamic field of software construction. The information and...
Table of contents: Part I: development techniques: encryption, role-based authorization, code-access security, ASP.NET authentication, securing web applications - Part II: ensuring hack-resistant...