8 Ergebnisse für: syngress
-
Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying ... - Jorge Orchilles - Google Books
https://books.google.de/books?id=bglZEJ-f-XYC&pg=PA9#v=onepage
Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and manage the operating system. The book is…
-
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance ... - Sudhanshu Chauhan, Nutan Kumar Panda - Google Books
https://books.google.de/books?id=5u2cBAAAQBAJ&pg=PA167#v=onepage
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that…
-
Malware Forensics: Investigating and Analyzing Malicious Code - Cameron H. Malin, Eoghan Casey, James M. Aquilina - Google Books
https://books.google.de/books?id=lRjO8opcPzIC&pg=PA309&pg=PA309#v=onepage
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and…
-
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance ... - Sudhanshu Chauhan, Nutan Kumar Panda - Google Books
https://books.google.de/books?id=5u2cBAAAQBAJ&pg=PA167&dq=dns+leak&hl=de#v=onepage&q=dns%20leak&f=false
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that…
-
Samhain | Software-Wiki | FANDOM powered by Wikia
http://de.software.wikia.com/index.php?title=Samhain
Samhain ist ein freies host-basiertes Intrusion-Detection-System (HIDS). Es ist in der Lage einzelne Rechner auf ungewöhnliche und eventuell bösartige Aktionen hin zu überwachen und zu untersuchen. So kann es zum Beispiel die Integrität von Dateien…
-
watchguard firewall - Google-Suche
http://books.google.de/books?lr=&q=watchguard+firewall&btnG=Nach+B%C3%BCchern+suchen
Keine Beschreibung vorhanden.
-
XSQL - Google-Suche
http://www.google.de/books?q=XSQL&btnG=Nach+B%C3%BCchern+suchen
Keine Beschreibung vorhanden.
-
DEF CON 13 Speakers Page
http://www.defcon.org/html/defcon-13/dc13-speakers.html#Clarke
Keine Beschreibung vorhanden.