Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself
PROLOGUE This amazing story, Santa Claus vs. The Aliens: A Christmas Wish, written by Don S. McClure from Chicago, Illinois, truly brings to life a Christmas story that old and young alike will enjoy for years to come. This story will bring you, the reader, to a level of amazement as you experience the pure magic and moral values in the pages of this fascinating adventure story. Only once in our lifetime does an author capture the essence of life and combine it with the issues of everyday living to share the very meaning of the Christmas season as well as Don S. McClure has with this masterpiece. The characters will entertain and amaze you. The story of a little girl's wish to end the wars on her planet-which Santa has never been to and whose people have never heard of Christmas or the man in the red suit-will make you enjoy this classic version of a Christmas tale, which is unlike any other you have ever read before. If you enjoyed any of the previous work created by Don S. McClure, you will list this among his best, including his autobiography, Broken Wings, Fallen Angels, and his second book, Romantic Images of You: Where My Heart Belongs, and the Kindle version, which placed him in the Amazon Top 100 Highest Paid Authors in America. Soon McClure's other titles will be released for your enjoyment, such as The Gods and The Beginning of Life and his crime thriller, To Have a Friend. This release of Santa Claus vs. The Aliens: A Christmas Wish will win the hearts and minds of all who read it, and surely will become a must-share with family and friends, year after year, as one of the great holiday tales of all times.
"A must-read for anyone in security. One of the best security books available." . --Tony Bradley, CISSP, About.com. "Authoritative.Even readers of earlier editions will find critical new insight on the more modern attacks." --From the Foreword by Gene Hodges, President of McAfee. "A cross between a spy novel and a tech manual." --Mark A. Kellner, "Washington Times," "The seminal book on white-hat hacking and countermeasures.... Should be required reading for anyone with a server or a network to secure." Bill Machrone, "PC Magazine," "With every edition this book keeps getting better and better. I can recommend it to anyone interested in computer security, as it will certainly give you a real-world course on the subject." Mirko Zorz, Net-security.org. The fifth edition of this world-renowned security reference offers completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using the proven "Hacking Exposed" methodology, the book shows you, step by step, how to locate and patch system vulnerabilities and explains what you need to know to stay vigilant in today's 24x7 digital world. . . New and Updated Material: . New chapter on hacking code, with contributions by Michael Howard, covering the ways flaws get introduced into software and how best to prevent them. New Windows hacks including RPCSS (Blaster), LSASS (Sasser), and PCT (Download.ject) buffer overflow exploits. Updated denial of service chapter with descriptions of large scale zombie attacks and practical countermeasures. Coverage of new web hacking tools and techniques including HTTP response splitting and automated vulnerability scanners. New content on remote connectivityincluding VoIP hacking. New coverage of web and e-mail client hacking, including the latest Internet Explorer exploits, phishing, spyware, rootkits, and bots. New hacks and countermeasures using Google as a reconnaissance tool. An updated footprinting chapter that deals with changes regarding finding information from Internet databases. Brand new case studies covering relevant and timely security attacks including Google, wireless, UNIX/Linux, and Mac OS X hacks.
|
You may like...
Snyman's Criminal Law
Kallie Snyman, Shannon Vaughn Hoctor
Paperback
|