Encryption Software and Books Encryption Software and Books
   Home >  Encryption Software >  Books > Security and Encryption


Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.




Bestselling and bargain books: Security and Encryption
* Search bestsellers
* Search bargain books
* Other books




   


Books -> Security and Encryption


Hacking for Dummies

by:
Beaver, Kevin
McClure, Stuart



Publisher:
For Dummies
Published: April 19, 2004
ISBN: 076455784X
Format:Paperback
Pages:378


   Read More, Buy It

Book Description
Review
"...a good read...a price well-worth paying, because such works are invaluable..." (InfoSecurity News Magazine, August 2004)

"...an excellent aide..." (PC Home, August 2004)

"...should be of interest to both ethical and malicious hackers..." (Publishing News, 22nd March 2004) "...a good read...a price well-worth paying, because such works are invaluable..." (InfoSecurity News Magazine, August 2004)

"...an excellent aide..." (PC Home, August 2004)

"...should be of interest to both ethical and malicious hackers..." (Publishing News, 22nd March 2004)

Product Description:
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized


  Read More, Buy It




Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.