System Administration

291470

By: Deviant Ollam

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the K...

234936

By: Jeff Laskowski

The book is a tutorial that goes from basic to professional level for Agile IT security. It begins by assuming little knowledge of agile security. Readers should hold a good knowledge of security methods and agile development. The book is targeted...

364272

By: Fussey, Coaffee

Often seen as the host nation's largest ever logistical undertaking, accommodating the Olympics and its attendant security infrastructure brings seismic changes to both the physical and social geography of its destination.Since 1976, the defence o...

149367

By: Rao Vallabhaneni

A must-have prep guide for taking the CISSP certification exam If practice does, indeed, make perfect, then this is the book you need to prepare for the CISSP certification exam! And while the six-hour exam may be grueling, the preparation for it ...

234910

By: Ian Wild

With clear instructions and plenty of screenshots, this book provides all the support and guidance you will need as you begin to convert your teaching to Moodle. Step-by-step tutorials use real-world examples to show you how to convert to Moodle i...

469141

By: Lee Barken

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN no...

1640604

By: Thomas Wilhelm, Jason Andress

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internal...

1640590

By: Enrico Perla, Massimiliano Oldani

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a d...

28965

By: Frank Thornton, Michael J. Schearer, Brad Haines

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published i...

35606

By: Anton Chuvakin, Branden R. Williams

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card I...