Client - side attacks and defense
Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-s...
Saved in:
| Main Author: | Shimonski, Robert |
|---|---|
| Other Authors: | Oriyano, Sean-Philip |
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress
c2012.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010)
by: Trost, Ryan
Published: (2010)
AAA identity management security
by: Santuka, Vivek
Published: (2011)
by: Santuka, Vivek
Published: (2011)
Guide to network defense and countermeasures
by: Weaver
Published: (2007)
by: Weaver
Published: (2007)
The hacker's handbook the strategy behind breaking into and defending network
by: Young 1968-
Published: (2004)
by: Young 1968-
Published: (2004)
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)
by: Dotson, Chris
Published: (2019)
The antivirus hacker's handbook
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
The management of network security technology, design, and management control
by: Carr, Houston H. 1937-
Published: (2010)
by: Carr, Houston H. 1937-
Published: (2010)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012)
by: Clarke, Justin
Published: (2012)
Computer security and penetration testing
by: Basta, Alfred
Published: (2008)
by: Basta, Alfred
Published: (2008)
Network security know it all
Published: (2008)
Published: (2008)
Network security first step
by: Thomas ,Tom
Published: (2004)
by: Thomas ,Tom
Published: (2004)
The Tao of network security monitoring beyond intrusion detection
by: Bejtlich ,Richard
Published: (2005)
by: Bejtlich ,Richard
Published: (2005)
Network Security Fundamentals
Published: (2008)
Published: (2008)
Network security current status and future directions
by: Douligeris
Published: (2007)
by: Douligeris
Published: (2007)
The Hacker's handbook the strategy behind breaking into and defending networks
by: Young lhSusan
by: Young lhSusan
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Intrusion detection a machine learning approach
by: Yu, Zhenwei
Published: (2011)
by: Yu, Zhenwei
Published: (2011)
How to cheat at securing your network
Published: (2007)
Published: (2007)
Practical guide for implementing secure intranets and axtranets
by: Phaltankar lhKaustubh M.
by: Phaltankar lhKaustubh M.
Building virtual pentesting labs for advanced penetration testing learn how to build complex virtual architectures that allow you to perform virtually any required testing methodology and perfect it
by: Cardwell, Kevin
Published: (2016)
by: Cardwell, Kevin
Published: (2016)
The basics of digital privacy simple tools to protect your personal your information and your identity online
by: Cherry, Denny
Published: (2014)
by: Cherry, Denny
Published: (2014)
Snort IDS and IPS toolkit
by: Beale, Jay, et al.
Published: (2007)
by: Beale, Jay, et al.
Published: (2007)
Guide to firewall and network security with instruction detection and VPNs
Published: (2009)
Published: (2009)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Secure computer and network systems modeling, analysis and design
by: Ye
Published: (2008)
by: Ye
Published: (2008)
The Browser Hacker's Handbook
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Implementing ipsec making security work on VPNS,intranets, and extranet
by: Kaufman
Published: (1994)
by: Kaufman
Published: (1994)
Digital identity management
Published: (2015)
Published: (2015)
The Stephen cobb complete book of PC and LAN security
by: Cobb lhStephen
by: Cobb lhStephen
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Protect Yourself Online IcMatthew Danda
by: Danda lhMatthew
by: Danda lhMatthew
Build your own security lab a field guide for network testing
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Cisco router and switch forensics investigating and analyzing malicious network activity
by: Liu, Dale
Published: (2009)
by: Liu, Dale
Published: (2009)
Network security assessment know your network
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
by: McNab, Chris (Chris R.) 1980-
Published: (2017)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Applied security visualization
by: Marty, Raffael 1976-
Published: (2009)
by: Marty, Raffael 1976-
Published: (2009)
Security in an IPv6 environment
by: Minoli, Daniel 1952-
Published: (2009)
by: Minoli, Daniel 1952-
Published: (2009)
Dissappearing cryptography information hiding steganography & watermarking
by: Wayner, Peter 1964-
Published: (2009)
by: Wayner, Peter 1964-
Published: (2009)
Similar Items
-
Practical intrusion analysis prevention and detection for the twenty-first century
by: Trost, Ryan
Published: (2010) -
AAA identity management security
by: Santuka, Vivek
Published: (2011) -
Guide to network defense and countermeasures
by: Weaver
Published: (2007) -
The hacker's handbook the strategy behind breaking into and defending network
by: Young 1968-
Published: (2004) -
Practical cloud security a guide for secure design and deployment
by: Dotson, Chris
Published: (2019)


