Exploiting server software

Xem 1-4 trên 4 kết quả Exploiting server software
  • Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out.

    pdf597p vutrung 07-09-2009 173 33   Download

  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)...

    pdf744p hoa_can 05-02-2013 30 5   Download

  • While it is important for network administrators to secure any host connected to the Internet, they must give name servers special consideration due to the important role they play. The purpose of this document is to outline some common steps that can be taken to secure an Internet Name Server from various types of attacks. Run a new version of your name server software As with any piece of software, name server software evolves with each release. Virtually all older name servers have widely known vulnerabilities that can be exploited.

    pdf19p doiroimavanchuadc 06-02-2013 24 2   Download

  • The term cloud computing refers to an Internet-based technology through which information is stored in servers and provided as a service (Software as a Service,or SaaS) and on-demand to clients (from the clouds indeed). Its impact will be spec- tacular on both consumers and firms. On one side, consumers will be able to ac- cess all of their documents and data from any device (the personal laptop, the mo- bile phone, an Internet Point..), as they already do for email services, and to exploit impressive computational capabilities.

    pdf48p bi_ve_sau 05-02-2013 28 4   Download


Đồng bộ tài khoản