Categories Unlimited Books

Web Application Firewalls

Web Application Firewalls Web applications are not protected by today’s network level firewalls, because they allow access to TCP port 80 without restrictions. However, many successful attacks today are not on the network level, but on application level. For protecting against application level attacks, a firewall must understand the application protocols, that are used on […]

Read More
Categories Unlimited Books

Secure Java

Secure Java As the Internet has evolved, so have the various vulnerabilities, which largely stem from the fact that developers are unaware of the importance of a robust application security program. This book aims to educate readers on application security and building secure web applications using the new Java Platform. Full descriptionNewMint ConditionDispatch same day […]

Read More
Categories Unlimited Books

CCNA Security (210-260) Portable Command Guide

Preparing for the latest CCNA Security exam? Here are all the CCNA Security (210-260) commands you need in one condensed, portable resource. Filled with valuable, easy-to-access information, the CCNA Security Portable Command Guide, is portable enough for you to use whether you’re in the server room or the equipment closet. Completely updated to reflect the […]

Read More
Categories Unlimited Books

Hacking For Dummies (For Dummies (Computers))

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize […]

Read More
Categories Unlimited Books

Accelerated Windows Malware Analysis with Memory Dumps: Training Course Tra…

The full transcript of Software Diagnostics Services training. Learn how to navigate process, kernel, and physical spaces and diagnose various malware patterns in Windows memory dump files. The course uses a unique and innovative pattern-oriented analysis approach to speed up the learning curve. The training consists of practical step-by-step hands-on exercises using WinDbg, process, kernel […]

Read More