Item type | Current library | Home library | Shelving location | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | American University in Dubai | American University in Dubai | Main Collection | QA 76.9. D314 I565 2008 (Browse shelf(Opens below)) | Available | 602056 |
QA 76.9 .D314 C39 1999 Security management / | QA 76.9 .D314 H26 2008 Handbook of database security : applications and trends / | QA 76.9 .D314 I34 2008 Data and applications security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008 : proceedings / | QA 76.9. D314 I565 2008 Infosecurity 2008 threat analysis / | QA 76.9 .D314 .L58 2007 The Oracle hacker's handbook : hacking and defending Oracle / | QA 76.9 .D314 N49 2010 Computer security : protecting digital resources / | QA 76.9 .D314 S36 2008 Secure data management : 5th VLDB workshop, SDM 2008, Auckland, New Zealand, August 24, 2008 : proceedings / |
Includes index.
Botnets : a call to action -- Botnets overview -- Cross-site scripting fundamentals -- XSS theory -- XSS attack methods -- Protecting critical infrastructure : process control and SCADA -- Final thoughts -- Why PCI is important -- Protect cardholder data -- Understanding and taking advantage of VoIP protocols -- Asterisk hardware ninjutsu -- Social engineering.
There are no comments on this title.