You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A brutal murder has happened in a southern Illinois cornfield. The culprit appears to be the local alcoholic. But, when another murder occurs while the suspect is in custody, Sheriff Mark Graff realizes the town drunk was merely a puppet in the real killer’s hands and that the truth is locked somewhere in the drunkard’s memory. Soon, the evidence starts to point toward the local migrant camp and the camp’s shady Padre. A vicious cat-and-mouse game begins between the Padre, his ward, and the police. In a chase that leads from southern Illinois to Chicago, madness and murder and religion meld into an unholy trinity that only Frank Powell can end. But can he?
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack. Network Security Assessment demonstrates how a determined attacker scours Internet-based networks in search of vulnerable components, from the network to the application level. This new edition is up-to-date on the latest hackin...
A computer security expert shows readers how to build more secure software by building security in and putting it into practice. The CD-ROM contains a tutorial and demo of the Fortify Source Code Analysis Suite.
Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.