Xem 1-9 trên 9 kết quả Stealing data
  • you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

    pdf356p stingdau_123 26-01-2013 22 4   Download

  • If a company’sWeb site is used to collect, compile, or process customer data, that company has an added point of vulnerability. The increased vulnerability in this situation arises from the potential of a hacker breaking into the Web site and stealing data such as names, address, account information, or credit card numbers. In addition, if the Web site is integrated with back-end applications or connected to other systems in the enterprise, there is a greater possibility that hackers and information thieves can access more sensitive information that otherwise may be kept private.

    pdf7p khongmuonnghe 04-01-2013 25 3   Download

  • WiMAX operates on the same general principles as Wi-Fi — it sends data from one computer to another via radio signals. A computer (either a desktop or a laptop) equipped with WiMAX would receive data from the WiMAX transmitting station, probably using encrypted data keys to prevent unauthorized users from stealing access.

    pdf10p thachsaudoi 23-12-2009 76 22   Download

  • The new overwatch security pillar acts as an infection detection, containment, and remediation engine that is automatically triggered when a threat has bypassed detection by the existing "in-line" infrastructure and has infiltrated the enterprise network. The overwatch security layer uses data from a real-time reputation and behavioral correlation database to detect active data-stealing malware and other potential threats.

    pdf14p khongmuonnghe 04-01-2013 32 5   Download

  • With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

    pdf112p hoa_can 29-01-2013 12 5   Download

  • Impersonation is closely related to unauthorized access but is significant enough to be discussed separately. Impersonation is the ability to present credentials as if you are something or someone you are not. These attacks can take several forms: stealing a private key or recording an authorization sequence to replay at a later time. These attacks are commonly referred to as man-in-the-middle attacks, where an intruder is able to intercept traffic and can as a result hijack an existing session, alter the transmitted data, or inject bogus traffic into the network.

    pdf43p cao_can 02-01-2013 19 3   Download

  • Viruses, worms, Trojans, and bots are all part of a class of software called malware. Malware or malicious code (malcode) is short for malicious software. It is code or software that is specifically designed to damage, disrupt, steal, or in general inflict some other “bad” or illegitimate action on data, hosts, or networks.

    pdf0p doilan 25-01-2013 22 3   Download

  • Attackers break into the web application by thinking like a programmer: identifying how the application is intended to work and determining shortcuts used to build the application. The hacker then attempts to interact with the application and its surrounding infrastructure in malicious ways simply by using the web browser or any of a large number of automatic hacker tools, such as CGI scanners and HTTP proxys.

    pdf10p doipassword 01-02-2013 16 3   Download

  • These days, as Internet dangers and risks increase exponentially, administrators of corporate networks are obliged to pay special attention to user workstation protection. Corporate servers can be very well protected, yet their client workstations may have backdoors for outside intrusions, which can be used to steal internal data or introduce confusion. To reduce the amount of network traffic and to control Internet usage by staff, administrators are filtering web site content and blocking net advertisements.

    pdf28p khongmuonnghe 04-01-2013 19 2   Download

Đồng bộ tài khoản