This book provides a very rare gift in the field of information security - brevity. It goes to the point. It explains many terms, some of which I had given up trying to understand, in incredibly simple sentences. Normally, halfway through a book, I've already forgotten the beginning - not with th
HackNotes Linux and Unix Security Portable Reference
β Scribed by Nitesh Dhanjani
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2003
- Tongue
- English
- Leaves
- 256
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Subjects
ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ°;ΠΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΠ°;Linux / Unix;
π SIMILAR VOLUMES
This book provides a very rare gift in the field of information security - brevity. It goes to the point. It explains many terms, some of which I had given up trying to understand, in incredibly simple sentences. Normally, halfway through a book, I've already forgotten the beginning - not with th
HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most t
Learn how hackers break into web applications with a tool as fundamental as a web browser, guard against simple to complex web application attacks, strengthen web application security using a detailed methodology for testing and secure coding, eliminate susceptibility to e-commerce, SQL injection, a
HackNotes Windows Security Portable Reference covers very interesting and pertinent topics, especially ones such as common ports and services, NetBIOS name table definitions, and other very specific areas that are essential to understand if one is to genuinely comprehend how Windows systems are atta
Let consultant, trainer, and author Mike Shema show you how to guard against standard and uncommon network penetration methodologies and eliminate susceptibility to e-commerce hacking. Plus, learn to bolster Web application security and secure vulnerable hacking function areas.