Jump to ratings and reviews
Rate this book

Applied Information Security

Rate this book
"Applied Information Security" guides readers through the installation and basic operation of IT Security software used in the industry today.
Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced
For readers looking for hands-on assignments in IT Security.

240 pages, Paperback

First published January 1, 2009

7 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3 (27%)
4 stars
3 (27%)
3 stars
3 (27%)
2 stars
1 (9%)
1 star
1 (9%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.