![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book is for system administrators and security professionals
who need to bring now ubiquitous IM and P2P applications under
their control. Many businesses are now taking advantage of the
speed and efficiency offered by both IM and P2P applications, yet
are completely ill-equipped to deal with the management and
security ramifications.
The wonders and advantages of modern age electronics and the World
Wide Web have also, unfortunately, ushered in a new age of
terrorism. The growing connectivity among secure and insecure
networks has created new opportunities for unauthorized intrusions
into sensitive or proprietary computer systems. Some of these
vulnerabilities are waiting to be exploited, while numerous others
already have. Everyday that a vulnerability or threat goes
unchecked greatly increases an attack and the damage it can cause.
Who knows what the prospects for a cascade of failures across US
infrastructures could lead to. What type of group or individual
would exploit this vulnerability, and why would they do it? "Inside
the Mind of a Criminal Hacker" sets the stage and cast of
characters for examples and scenarios such as this, providing the
security specialist a window into the enemy s mind - necessary in
order to develop a well configured defense. Written by leading
security and counter-terrorism experts, whose experience include
first-hand exposure in working with government branches &
agencies (such as the FBI, US Army, Department of Homeland
Security), this book sets a standard for the fight against the
cyber-terrorist. Proving, that at the heart of the very best
defense is knowing and understanding your enemy.
The realistic portrayals of researching, developing, and ultimately
defending the Internet from a malicious "Zero-Day" attack will
appeal to every corner of the IT community. Although finctional,
the numerous accounts of real events and references to real people
will ring true with every member of the security community. This
book will also satisfy those not on the "inside" of this community,
who are fascinated by the real tactics and motives of criminal,
malicous hackers and those who defent the Internet from them.
|
You may like...
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn
Paperback
|