Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
PROGRAMMING PYTHON: POWERFUL OBJECT-ORIENTED PROGRAMMING (COVERS PYTHON 3.X), 4TH EDITION
NRS 4480.00
 
Book details / order
HACKING EXPOSED LINUX
The latest linux security solutions this authoritative guide will help you secure your linux network--whether you use linux as a desktop os, for internet services, for telecommunications, or for wireless services. completely rewritten the isecom way, hacking exposed linux, third edition provides the most up-to-date coverage available from a large team of topic-focused experts. the book is based on the latest isecom security research and shows you, in full detail, how to lock out intruders and defend your linux systems against catastrophic attacks. secure linux by using attacks and countermeasures from the latest osstmm research follow attack techniques of pstn, isdn, and psdn over linux harden voip, bluetooth, rf, rfid, and ir devices on linux block linux signal jamming, cloning, and eavesdropping attacks apply trusted computing and cryptography tools for your best defense fix vulnerabilities in dns, smtp, and web 2.0 services prevent spam, trojan, phishing, dos, and ddos exploits find and repair errors in c code with static analysis and hoare logic. table of contents: foreword acknowledgments introduction part i: security and controls chapter 1. applying security chapter 2. applying interactive controls chapter 3. applying process controls part ii: hacking the system chapter 4. local access control chapter 5. data networks security chapter 6. unconventional data attack vectors chapter 7. voice over ip chapter 8. wireless networks chapter 9. input/output devices chapter 10. rfid--radio frequency identification chapter 11. emanation attacks chapter 12. trusted computing part iii: hacking the users chapter 13. web application hacking chapter 14. mail services chapter 15. name services part iv: care and maintenance chapter 16. reliability: static analysis of c code chapter 17. security tweaks in the linux kernal part v: appendixes appendix a. management and maintenance appendix b. linux forensics and data recovery

Author : Isecom,
Publication : Tata
Isbn : 978-0-07-018772-6
Store book number : 106
NRS 840.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST GO: A BRAIN-FRIENDLY GUIDE
NRS 2400.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008