Sicurezza Delle Reti Applicazioni E Standard

Autore: William Stallings
Editore: Pearson Italia S.p.a.
ISBN: 9788871923451
Grandezza: 79,27 MB
Formato: PDF, Kindle
Vista: 6661
Scaricare Leggi Online

Informatica Giuridica

Autore: Giovanni Ziccardi
Editore: Giuffrè Editore
ISBN: 881415578X
Grandezza: 45,74 MB
Formato: PDF, Mobi
Vista: 3078
Scaricare Leggi Online

Sicurezza Dei Sistemi Informatici

Autore: M. Grazia Fugini
Editore: Apogeo Editore
ISBN: 9788873037408
Grandezza: 80,75 MB
Formato: PDF, ePub, Docs
Vista: 3096
Scaricare Leggi Online

La Sicurezza Delle Reti Wireless

Autore: Merritt Maxim
Editore: Apogeo Editore
ISBN: 9788850320349
Grandezza: 34,67 MB
Formato: PDF, ePub, Mobi
Vista: 8053
Scaricare Leggi Online

Sicurezza Macchine Le Nuove Disposizioni Legislative E Le Applicazioni In Ambito Industriale

Editore: Tecniche Nuove
ISBN: 8848124089
Grandezza: 36,88 MB
Formato: PDF, Kindle
Vista: 5821
Scaricare Leggi Online

The Art Of Intrusion

Autore: Kevin D. Mitnick
Editore: John Wiley & Sons
ISBN: 9780470503829
Grandezza: 69,75 MB
Formato: PDF, Mobi
Vista: 5569
Scaricare Leggi Online

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Reti Di Calcolatori E Internet Un Approccio Top Down

Autore: James F. Kurose
Editore: Pearson
ISBN: 887192455X
Grandezza: 69,43 MB
Formato: PDF, ePub, Docs
Vista: 2455
Scaricare Leggi Online

Internet Security

Autore: Maurizio Cinotti
ISBN: 9788820330453
Grandezza: 42,38 MB
Formato: PDF, ePub
Vista: 5709
Scaricare Leggi Online

Sscp Systems Security Certified Practitioner All In One Exam Guide

Autore: Darril Gibson
Editore: McGraw Hill Professional
ISBN: 0071771557
Grandezza: 49,80 MB
Formato: PDF
Vista: 8295
Scaricare Leggi Online

Get complete coverage of all the material on the Systems Security Certified Practitioner (SSCP) exam inside this comprehensive resource. Written by a leading IT security certification and training expert, this authoritative guide addresses all seven SSCP domains as developed by the International Information Systems Security Certification Consortium (ISC)2, including updated objectives effective February 1, 2012. You'll find lists of topics covered at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, SSCP Systems Security Certified Practitioner All-in-One Exam Guide also serves as an essential on-the-job reference. Covers all exam domains, including: Access controls Networking and communications Attacks Malicious code and activity Risk, response, and recovery Monitoring and analysis Controls and countermeasures Auditing Security operations Security administration and planning Legal issues Cryptography CD-ROM features: TWO PRACTICE EXAMS PDF COPY OF THE BOOK