IT eBooks
Download, Read, Use
Practical Reverse Engineering
Practical Reverse Engineering

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. ...
Android Hacker's Handbook
Android Hacker's Handbook

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. ...
The Browser Hacker's Handbook
The Browser Hacker's Handbook

The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. ...
CISSP Training Kit
CISSP Training Kit

Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you've learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help make the most of your study time. ...
Oracle 11g Anti-hacker's Cookbook
Oracle 11g Anti-hacker's Cookbook

Learn to protect your sensitive data by using industry certified techniques. Implement and use ultimate techniques in Oracle Security and new security features introduced in Oracle 11g R2. Implement strong network communication security using different encryption solutions provided by Oracle Advanced Security. ...
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook

Practical, focused recipes for securing your SQL Server database. Master the latest techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, and more. A learn-by-example recipe-based approach that focuses on key concepts to provide the foundation to solve real world problems. ...
Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications
Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications

Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework. Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services. Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks. A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems. ...
Governance, Risk, and Compliance Handbook for Oracle Applications
Governance, Risk, and Compliance Handbook for Oracle Applications

Governance: In depth coverage of corporate, IT, and security Governance, which includes important topics such as strategy development and communication, strategic reporting and control, and more. Risk Management: Creating a risk management program, performing risk assessment and control verification, and more. Compliance Management: Cross-industry, cross-regional laws and regulations, industry-specific laws and regulations, region-specific laws and regulations. To maximize real world learning, the book is built around a fictional company establishing its governance processes. Written by industry experts with more than 30 years combined experience. ...
Oracle Web Services Manager
Oracle Web Services Manager

Secure your web services using Oracle WSM Authenticate, Authorize, Encrypt, and Decrypt messages. Create Custom Policy to address any new Security implementation. Deal with the issue of propagating identities across your web applications and web services. Detailed examples for various security use cases with step-by-step configurations. ...
Apache Solr 3 Enterprise Search Server
Apache Solr 3 Enterprise Search Server

Comprehensive information on Apache Solr 3 with examples and tips so you can focus on the important parts. Integration examples with databases, web-crawlers, XSLT, Java & embedded-Solr, PHP & Drupal, JavaScript, Ruby frameworks. Advice on data modeling, deployment considerations to include security, logging, and monitoring, and advice on scaling Solr and measuring performance. An update of the best-selling title on Solr 1.4. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025