Search results
9 search for keyword(s) 'Computers--Access control'
Add the result to your basket Refine your search Make a suggestion
Books
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-securit[...]
Edition statement: 2nd ed. ISBN (or other code): 978-1-4496-2636-5 Article on page: XXXI, 783 p. Descriptors: Class number: 005.8 Tags: Hackers ; Computers--Access control ; Computer viruses Languages: English Books
Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit s[...]
ISBN (or other code): 978-1-78216-316-9 Article on page: VI, 321 p. Class number: 006.74 Tags: Computer security ; Computers--Access control ; Web sites--Testing ; Computer networks--Security measures ; Web sites--Evaluation Languages: English Books
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company’s network, locate their most critical data, and make off with it without triggering whatever shiny new[...]
ISBN (or other code): 978-1-5204-7851-7 Article on page: s. p. Descriptors: Class number: 005.8 Tags: Computer security ; Hackers ; Computer crimes ; Computers--Access control ; Computer hackers Languages: English Books
Dans cet ouvrage, Claude Pinet s'adresse à tous les intervenants liés au système d'information et à tous les utilisateurs de l'information afin d'améliorer la confiance dans les informations véhiculées. Il détaille et explique la structure et le[...]
ISBN (or other code): 978-2-12-465567-0 Article on page: XXIV, 187 p. Descriptors: Class number: 658.403 8 Tags: Computers--Access control ; Business enterprises--Security measures ; Data protection Languages: French Books
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in re[...]
Edition statement: 4th ed. ISBN (or other code): 978-0-12-802149-1 Article on page: XXI, 435 p. Descriptors: Class number: 005.8 Tags: Penetration testing (Computer security) ; Computers--Access control ; Computer networks--Security measures--Testing Languages: English Books
Joffrey Clarhaut ; Franck Ebel ; Nicolas Dupoty ; Jérôme Hennecart ; Frédéric Vicogne | Editions ENI | Epsilon | 2015Ce livre sur la cyberdéfense s'adresse à toute personne sensibilisée au concept de la sécurité dans le domaine industriel. Il a pour objectif d'initier le lecteur aux techniques les plus courantes des attaquants pour lui apprendre comment se déf[...]
ISBN (or other code): 978-2-7460-9788-9 Article on page: 337 p. Descriptors: Class number: 363.325 900 4 Tags: Computer security ; Computer networks--Security measures ; Computer security--Management ; Computers--Access control ; Industries--Security measures ; Industrial safety--Computer programs ; Industrial safety--Data processing Languages: French Books
This book constitutes the refereed proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2015, held in Milan, Italy, in July 2015. The 17 revised full papers presented were c[...]
ISBN (or other code): 978-3-319-20549-6 Article on page: XII, 349 p. Descriptors: Class number: 005.8 Tags: Computer security--Congresses ; Computer security ; Computers--Access control ; Computer networks--Security measures Languages: English Books
Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these prot[...]
ISBN (or other code): 978-1-60750-713-0 Article on page: VII, 303 p. Descriptors: Class number: 005.8 Tags: Computer security ; Computers--Access control ; Computer networks--Security measures ; Electronic information resources--Access control Languages: English Books
Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and[...]
Edition statement: 3rd ed. ISBN (or other code): 978-1-59749-627-8 Article on page: XXI, 441 p. Tags: Penetration testing (Computer security) ; Computers--Access control Languages: English
Dans les rubriques du site :
Pas de résultats.