Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today.
Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced
For readers looking for hands-on assignments in IT Security.
Applied Information Security
📄 Viewing lite version
Full site ›
Book Details
Author(s)Randy J Boyle
PublisherPrentice Hall
ISBN / ASIN0136122035
ISBN-139780136122036
Sales Rank490,098
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
More Books in Computers
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View