You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Get into the hacker's mind--and outsmart him! Fully updated for the latest threats, tools, and countermeasures Systematically covers proactive, reactive, and preemptive security measures Detailed, step-by-step techniques for protecting HP-UX, Linux, and UNIX systems "Takes on even more meaning now than the original edition!" --Denny Georg, CTO, Information Technology, Hewlett-Packard Secure your systems against today's attacks--and tomorrow's. Halting the Hacker: A Practical Guide to Computer Security, Second Edition combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system. Top Hewlett-Packard security ar...
It considers the Wesleyan brothers' (John (1703-1791) and Charles Wesley (1707-1788)) Methodist movement. The volume describes the struggle between what Methodists saw as the promptings of Holy Spirit and their daily confrontation with reality, not least the financial constraints which they faced.
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing ta
In today's climate, these is a powerful need for a balanced, expert and accessible account of the psychology of terrorists and terrorism. Written by an expert team of psychologists and psychiatrists, these contributors have direct experience of working with terrorists, victims and those tasked with the enormous responsibility of attempting to combat terrorism. The first section focuses on terrorists as individuals and as groups and provides a balanced and objective insight into the psychology of terrorists; what their motivations are and what keeps them involved in terrorist groups. The second section explores the huge question of the impact of terrorism; the direct and indirect affect on victims; how societies respond and how political leaders handle the threat and consequences of terrorism. The final section focuses on the question of how to respond to terrorist threat. The most up-to-date account of our understanding of terrorists, their psychology and the impact they have on the world around them Written by leading world experts on terrorist psychology A complete view of terrorism - looks at the terrorists themselves, their victims and society as a whole
What do detectives do if they need help identifying a body or a cause of death? Experts are called in to investigate! Learn how sketch artists use skulls or witness descriptions to figure out what a victim or perpetrator may have looked like. Follow the steps toxicologists take when examining bodies and crime scenes for traces of poison. Analyze bones as forensic anthropologists identify victims--all to help the police crack the case!
A desperate woman seeking asylum - A tired undercover agent wanting out - A plot full of romance, mystery and mayhem! Sara needs to forget about her past so she winds up in Key West to start over. But she can't seem to stay out of trouble and when her brother goes missing, she needs expert advice and help. This story is packed with action and adventure that takes you on a journey starting at the heart of Key West. Josh, a character from an earlier book from one of the earlier books in the series, has mixed emotions about retiring. He's spent the last ten years undercover. Now, most days are spent relaxing on the islands, unsure of his next move. He had no plans to get involved with a strange...
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. The range of topics presented includes how to: -Evade post-mortem analysis -Frustrate attempts to reverse engineer your command & control modules -Defeat live incident response -Undermine the process of memory analysis -Modify subsystem internals to feed misinformation to the outside -Entrench your code in fortified regions of execution -Design and implement covert channels -Unearth new avenues of attack
"Computer Security Handbook" - Jetzt erscheint der Klassiker in der 4. aktualisierten Auflage. Es ist das umfassendste Buch zum Thema Computersicherheit, das derzeit auf dem Markt ist. In 23 Kapiteln und 29 Anhängen werden alle Aspekte der Computersicherheit ausführlich behandelt. Die einzelnen Kapitel wurden jeweils von renommierten Experten der Branche verfasst. Übersichtlich aufgebaut, verständlich und anschaulich geschrieben. Das "Computer Security Handbook" wird in Fachkreisen bereits als DAS Nachschlagewerk zu Sicherheitsfragen gehandelt.