Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced For readers looking for hands-on assignments in IT Security.
"Sinopsis" puede pertenecer a otra edición de este libro.
Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced For readers looking for hands-on assignments in IT Security.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: Once Upon A Time Books, Siloam Springs, AR, Estados Unidos de America
Paperback. Condición: Good. This is a used book in good condition and may show some signs of use or wear . This is a used book in good condition and may show some signs of use or wear . Nº de ref. del artículo: mon0001128438
Cantidad disponible: 1 disponibles