Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced For readers looking for hands-on assignments in IT Security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : BooksRun, Philadelphia, PA, Etats-Unis
Paperback. Etat : Very Good. 1. It's a well-cared-for item that has seen limited use. The item may show minor signs of wear. All the text is legible, with all pages included. It may have slight markings and/or highlighting. N° de réf. du vendeur 0136122035-8-1
Quantité disponible : 1 disponible(s)
Vendeur : Once Upon A Time Books, Siloam Springs, AR, Etats-Unis
Paperback. Etat : Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . N° de réf. du vendeur mon0001128438
Quantité disponible : 1 disponible(s)
Vendeur : Phatpocket Limited, Waltham Abbey, HERTS, Royaume-Uni
Etat : Good. Your purchase helps support Sri Lankan Children's Charity 'The Rainbow Centre'. Ex-library, so some stamps and wear, but in good overall condition. Our donations to The Rainbow Centre have helped provide an education and a safe haven to hundreds of children who live in appalling conditions. N° de réf. du vendeur Z1-H-006-02295
Quantité disponible : 2 disponible(s)