![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 3 of 3 matches in All Departments
This book is for system administrators and security professionals
who need to bring now ubiquitous IM and P2P applications under
their control. Many businesses are now taking advantage of the
speed and efficiency offered by both IM and P2P applications, yet
are completely ill-equipped to deal with the management and
security ramifications.
The realistic portrayals of researching, developing, and ultimately
defending the Internet from a malicious "Zero-Day" attack will
appeal to every corner of the IT community. Although finctional,
the numerous accounts of real events and references to real people
will ring true with every member of the security community. This
book will also satisfy those not on the "inside" of this community,
who are fascinated by the real tactics and motives of criminal,
malicous hackers and those who defent the Internet from them.
The wonders and advantages of modern age electronics and the World
Wide Web have also, unfortunately, ushered in a new age of
terrorism. The growing connectivity among secure and insecure
networks has created new opportunities for unauthorized intrusions
into sensitive or proprietary computer systems. Some of these
vulnerabilities are waiting to be exploited, while numerous others
already have. Everyday that a vulnerability or threat goes
unchecked greatly increases an attack and the damage it can cause.
Who knows what the prospects for a cascade of failures across US
infrastructures could lead to. What type of group or individual
would exploit this vulnerability, and why would they do it? "Inside
the Mind of a Criminal Hacker" sets the stage and cast of
characters for examples and scenarios such as this, providing the
security specialist a window into the enemy s mind - necessary in
order to develop a well configured defense. Written by leading
security and counter-terrorism experts, whose experience include
first-hand exposure in working with government branches &
agencies (such as the FBI, US Army, Department of Homeland
Security), this book sets a standard for the fight against the
cyber-terrorist. Proving, that at the heart of the very best
defense is knowing and understanding your enemy.
|
You may like...
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R358
Discovery Miles 3 580
Touring Guitarist Handbook - 101 Secrets…
Howexpert, Brandon Humphreys
Hardcover
R733
Discovery Miles 7 330
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
Spring Awakening - Spring Awakening…
Duncan Sheik, Steven Sater
Paperback
|