Encryption Software and Books Encryption Software and Books
   Home >  Encryption Software >  Books > Security and Encryption

Windows Utilities

Strong File(Folder) Encryption Decryption Utility: easily encrypt and decrypt your files and folders.

Encryption Software - Service Edition with Scheduling: allows you easily and quickly to run scheduled encryption and decryption sessions as a service process.

Auto FTP Premium: save time and money with automated ftp client software. Upload and download encrypted files and folders.

Bestselling and bargain books: Security and Encryption
* Search bestsellers
* Search bargain books
* Other books


Books -> Security and Encryption

Security Warrior

Peikari, Cyrus
Chuvakin, Anton

Published: February 1, 2004
ISBN: 0596005458

   Read More, Buy It

Book Description
From Book News, Inc.
Reasoning that the best way to defend a computer system is to possess a detailed knowledge of the techniques malicious punks could use to attack it, Peikari and Chuvakin have written a detailed tutorial. The book is in four broad sections: software cracking, which details techniques of reverse engineering on Windows, Windows CE, and Linux systems; network stalking--on techniques used to compromise computer networks; platform attacks--covering ways to exploit vulnerabilities in specific software programs such as Unix and SQL Server; and finally a section on advanced defensive techniques such as honeypots. Although little familiarity with computer security techniques is assumed, an intermediate to advanced level of general computer knowledge is required; the software cracking section, for example, provides a brief refresher tutorial in assembly language, but would swiftly confuse anyone encountering the material for the first time.Copyright 2004 Book News, Inc., Portland, OR

Product Description:
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.

Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

  Read More, Buy It

Copyright © 1996-2005 PrimaSoft PC, Inc. All rights reserved.