The myths of security

Xem 1-5 trên 5 kết quả The myths of security
  • If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever.

    pdf262p stingdau_123 19-01-2013 18 2   Download

  • LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple. Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch.

    pdf361p vusuakhonghat 28-05-2009 528 250   Download

  • Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you'll want this book beside you every step of the way....

    pdf204p luvpuca 01-04-2011 77 19   Download

  • Dispels the myth that JavaScript is a "baby" language and demonstrates why it is the scripting language of choice used in the design of millions of Web pages and server-side applications Quickly covers JavaScript basics and then moves on to more advanced topics such as object-oriented programming, XML, Web services, and remote scripting Addresses the many issues that Web application developers face, including internationalization, security, privacy, optimization, intellectual property issues, and obfuscation Builds on the reader's basic understanding of HTML, CSS, and the We...

    pdf674p titatu_123 09-03-2013 49 8   Download

  • Based on growing bandwidth and service demands, the ideal network would be founded on an all fiber cable infrastructure. The expensive electronics located along this high-speed network would be equipped with fiber interfaces to take advantage of the medium’s bandwidth, resistance to EMI, better security, and freedom from confining distance limitations.

    pdf7p mylinh 14-08-2009 49 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản