Advertisement

Faster previews. Personalized experience. Get started with a FREE account.
Database Nation

Database Nation

by Simson Garfinkel
336 Pages · 2000 · 6.1 MB · 4,572 Downloads · New!
" Happiness doesn't result from what we get, but from what we give. ” ― Ben Carson
Applied Cryptography, 2nd Edition
by Bruce Schneier
662 Pages · 1996 · 2.8 MB · 2,088 Downloads · New!
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.
Security Metrics
by Andrew Jaquith
336 Pages · 2007 · 4.1 MB · 4,694 Downloads · New!
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Security Power Tools
by Bryan Burns
864 Pages · 2007 · 12.1 MB · 2,392 Downloads · New!
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks’ Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.
Disassembling Code: IDA Pro and SoftICE
by Vlad Pirogov
365 Pages · 2006 · 3.4 MB · 3,444 Downloads · New!
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize different elements of disassembled code in order to debug applications in less time. Also described are the basics of Assembly language programming (MASM) and the system and format of commands for the Intel microprocessor. Aspects of disassembling, analyzing, and debugging software code are considered in detail, and an overview of contemporary disassemblers and debuggers used when analyzing executable code is provided. The basics of working with these tools and their operating principles are also included, and emphasis is placed on analyzing software code and identifying the main structure of those languages in which they were written.
Network Security Hacks, 2nd Edition
by Andrew Lockhart
480 Pages · 2006 · 7.6 MB · 2,076 Downloads · New!
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.
PGP & GPG
by Michael Lucas
216 Pages · 2006 · 3.4 MB · 1,067 Downloads · New!
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.

Advertisement

Advertisement

Advertisement