Related Books

Chained Exploits
Language: en
Pages: 474
Authors: Andrew Whitaker
Categories: Computers
Type: BOOK - Published: 2009-02-27 - Publisher: Pearson Education

DOWNLOAD EBOOK

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just
Inside the Security Mind
Language: en
Pages: 336
Authors: Kevin Day
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Prentice Hall Professional

DOWNLOAD EBOOK

A guide to managing the process of securing an enterprise network, covering all aspects from perimeter security to application security.
Guide to Vulnerability Analysis for Computer Networks and Systems
Language: en
Pages: 381
Authors: Simon Parkinson
Categories: Computers
Type: BOOK - Published: 2018-09-04 - Publisher: Springer

DOWNLOAD EBOOK

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerabilit
Software Defined Networking for Ad Hoc Networks
Language: en
Pages: 169
Authors: Mangesh M. Ghonge
Categories: Technology & Engineering
Type: BOOK - Published: 2022-02-09 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book offers a comprehensive overview of Software-Defined Network (SDN) based ad-hoc network technologies and exploits recent developments in this domain, w
Effective Vulnerability Management
Language: en
Pages: 192
Authors: Chris Hughes
Categories: Computers
Type: BOOK - Published: 2024-04-30 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend treme