Informatyka / Hacking
Hakowanie Androida. Kompletny przewodnik XDA Developers po rootowaniu, ROM-ach i kompozycjach
Autor: Jason Tyler (Author), Will Verduzco (Contributor)
Sprawdź, co potrafi Twój telefon! System operacyjny Android ma rzeszę fanów. Zdobył ich dzięki swym niezwykłym możliwościom, imponującej elastyczności oraz ogromowi dostępnych aplikacji. System ten łączy w sobie prostotę ważną dla początkujących użytkowników z możliwościami rozwoju i ingerencji istotny ...
Informatyka śledcza. Przewodnik po narzędziach open source
Autor: Cory Altheide, Harlan Carvey
Informatyka śledcza w najlepszym wydaniu! Współczesne systemy informatyczne przetwarzają gigantyczne ilości bezcennych danych. Numery kart płatniczych, przelewy bankowe, historie pacjentów to tylko niektóre z nich. Ich zniszczenie lub kradzież to niewyobrażalne straty, za które winni muszą ...
Podręcznik pentestera. Bezpieczeństwo systemów informatycznych
Autor: Peter Kim
Zweryfikuj bezpieczeństwo systemów informatycznych! Testy penetracyjne (pentesty) to najbardziej wiarygodny sposób zweryfikowania bezpieczeństwa systemów informatycznych. Specjaliści na zlecenie próbują włamać się do systemu. Stosują przy tym wyrafinowane techniki, z których prawdopo ...
The Internet of Risky Things. Trusting the Devices That Surround Us
Autor: Sean Smith
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current intern ...
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
Autor: Will Iverson
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their o ...
The Internet: The Missing Manual. The Missing Manual
Autor: J. D. Biersdorfer, David Pogue
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. ...
Computer Security Basics. 2nd Edition
Autor: Rick Lehtinen, G. T. Gangemi
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates ...
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
Autor: John Viega
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confro ...
Building Internet Firewalls. 2nd Edition
Autor: Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect b ...
RADIUS. Securing Public Access to Private Resources
Autor: Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and acco ...