Faster previews. Personalized experience. Get started with a FREE account.
Security Power Tools

Security Power Tools

by Bryan Burns
864 Pages · 2007 · 12.1 MB · 2,323 Downloads · New!
" Happiness doesn't result from what we get, but from what we give. ” ― Ben Carson
Database Nation
by Simson Garfinkel
336 Pages · 2000 · 6.1 MB · 4,537 Downloads · New!
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardcover edition, Database Nation: The Death of Privacy in the 21st Century, is the compelling account of how invasive technologies will affect our lives in the coming years. It’s a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today.
Applied Cryptography, 2nd Edition
by Bruce Schneier
662 Pages · 1996 · 2.8 MB · 2,013 Downloads · New!
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
Security Metrics
by Andrew Jaquith
336 Pages · 2007 · 4.1 MB · 4,620 Downloads · New!
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Disassembling Code: IDA Pro and SoftICE
by Vlad Pirogov
365 Pages · 2006 · 3.4 MB · 3,387 Downloads · New!
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize different elements of disassembled code in order to debug applications in less time. Also described are the basics of Assembly language programming (MASM) and the system and format of commands for the Intel microprocessor. Aspects of disassembling, analyzing, and debugging software code are considered in detail, and an overview of contemporary disassemblers and debuggers used when analyzing executable code is provided. The basics of working with these tools and their operating principles are also included, and emphasis is placed on analyzing software code and identifying the main structure of those languages in which they were written.
Network Security Hacks, 2nd Edition
by Andrew Lockhart
480 Pages · 2006 · 7.6 MB · 1,993 Downloads · New!
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
by Michael Lucas
216 Pages · 2006 · 3.4 MB · 1,015 Downloads · New!
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.