Securing Web Services: Practical Usage of Standards and Specifications

Product Description
Web services are a business-driven technology, as they have arisen from a need for on-demand services and just-in-time integration to enable the rapid exploitation of market opportunities. Security challenges have accelerated alongside the rapid advances in this domain. The security requirement standards address a number of security and dependability issues. Securing Web Services: Practical Usage of Standards and Specifications collects a complete set of s… More >>

Securing Web Services: Practical Usage of Standards and Specifications

Exploiting Online Games: Cheating Massively Distributed Systems

Product Description
“Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don’t want to be the last person to attack your own system–you should be the first.”The world is quickly going online. While I caution against online voting, it is clear that … More >>

Exploiting Online Games: Cheating Massively Distributed Systems

Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem

Product Description
 Today, if you own a Windows computer you need to understand the risks and the potential damage security threats pose. The mere act of turning on an Internet-connected computer can put you, your family, and even your personal finances at risk! This book defines all the threats an average household might face and provides strategies to turn novice and basic users into adept home security experts, making you safer and more secure from cyber criminals.   We start… More >>

Windows Lockdown!: Your XP and Vista Guide Against Hacks, Attacks, and Other Internet Mayhem

Intrusion Detection with Snort

Product Description
With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium – to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rul… More >>

Intrusion Detection with Snort