Listing 1 - 10 of 18 | << page >> |
Sort by
|
Choose an application
In January 2002, for the first time, the Olympic Torch Relay visited Alaska on its way to the Winter Games. When the relay runner and accompanying camera cars passed Juneau-Douglas High School, senior Joseph Frederick and several friends unfurled a fourteen-foot banner reading ""BONG HiTS 4 JESUS."" An in-depth look at student rights within a public high school, this book chronicles the events that followed: Frederick's suspension, the subsequent suit against the school district, and, ultimately, the escalation of a local conflict into a federal case. Brought to life through interviews with th.
Freedom of speech --- High school students --- Students --- Legal status, laws, etc. --- Civil rights --- Education --- Morse, Deborah, --- Frederick, Joseph --- City and Borough of Juneau School District --- Greater Juneau Borough School District, Alaska --- Juneau (Alaska). --- Juneau School District --- Morse, Deborah (School principal) --- Trials, litigation, etc. --- United States --- Alaska --- United States. --- Alaska. --- Â-lâ-sṳ̂-k --- AK --- Alaasika --- ʻĀlaka --- Alasca --- Alasijia --- Alasijia Zhou --- Alaska Eyâleti --- Alaska osariik --- Alaska Territory --- Alasḳah --- Alasko --- Alaszka --- Ali͡ask --- Ali͡aska --- Aljaška --- Allaesŭkʻa --- Allaesŭkʻa-ju --- Allaesŭkʻaju --- Alyaska --- Alyaska Shitati --- Arasuka --- Arasuka-sh --- Arasukash --- Civitas Alascae --- Estado de Alaska --- Estado ng Alaska --- Hakʼaz Dineʼé Bikéyah Hahoodzo --- Medinat Alasḳah --- Politeia tēs Alaska --- Russian America --- Russkai͡a Amerika --- Shtat Ali͡aska --- State of Alaska --- Statul Alaska --- Territory of Alaska --- ABŞ --- ABSh --- Ameerika Ühendriigid --- America (Republic) --- Amerika Birlăshmish Shtatlary --- Amerika Birlăşmi Ştatları --- Amerika Birlăşmiş Ştatları --- Amerika ka Kelenyalen Jamanaw --- Amerika Qūrama Shtattary --- Amerika Qŭshma Shtatlari --- Amerika Qushma Shtattary --- Amerika (Republic) --- Amerikai Egyesült Államok --- Amerikanʹ Veĭtʹsėndi͡avks Shtattnė --- Amerikări Pĕrleshu̇llĕ Shtatsem --- Amerikas Forenede Stater --- Amerikayi Miatsʻyal Nahangner --- Ameriketako Estatu Batuak --- Amirika Carékat --- AQSh --- Ar. ha-B. --- Arhab --- Artsot ha-Berit --- Artzois Ha'bris --- Bí-kok --- Ē.P.A. --- É.-U. --- EE.UU. --- Egyesült Államok --- ĒPA --- Estados Unidos --- Estados Unidos da América do Norte --- Estados Unidos de América --- Estaos Xuníos --- Estaos Xuníos d'América --- Estatos Unitos --- Estatos Unitos d'America --- Estats Units d'Amèrica --- Ètats-Unis d'Amèrica --- États-Unis d'Amérique --- ÉU --- Fareyniḳṭe Shṭaṭn --- Feriene Steaten --- Feriene Steaten fan Amearika --- Forente stater --- FS --- Hēnomenai Politeiai Amerikēs --- Hēnōmenes Politeies tēs Amerikēs --- Hiwsisayin Amerikayi Miatsʻeal Tērutʻiwnkʻ --- Istadus Unidus --- Jungtinės Amerikos valstybės --- Mei guo --- Mei-kuo --- Meiguo --- Mî-koet --- Miatsʻyal Nahangner --- Miguk --- Na Stàitean Aonaichte --- NSA --- S.U.A. --- SAD --- Saharat ʻAmērikā --- SASht --- Severo-Amerikanskie Shtaty --- Severo-Amerikanskie Soedinennye Shtaty --- Si͡evero-Amerikanskīe Soedinennye Shtaty --- Sjedinjene Američke Države --- Soedinennye Shtaty Ameriki --- Soedinennye Shtaty Severnoĭ Ameriki --- Soedinennye Shtaty Si͡evernoĭ Ameriki --- Spojené obce severoamerické --- Spojené staty americké --- SShA --- Stadoù-Unanet Amerika --- Stáit Aontaithe Mheiriceá --- Stany Zjednoczone --- Stati Uniti --- Stati Uniti d'America --- Stâts Unîts --- Stâts Unîts di Americhe --- Steatyn Unnaneysit --- Steatyn Unnaneysit America --- SUA --- Sŭedineni amerikanski shtati --- Sŭedinenite shtati --- Tetã peteĩ reko Amérikagua --- U.S. --- U.S.A. --- United States of America --- Unol Daleithiau --- Unol Daleithiau America --- Unuiĝintaj Ŝtatoj de Ameriko --- US --- USA --- Usono --- Vaeinigte Staatn --- Vaeinigte Staatn vo Amerika --- Vereinigte Staaten --- Vereinigte Staaten von Amerika --- Verenigde State van Amerika --- Verenigde Staten --- VS --- VSA --- Wááshindoon Bikéyah Ałhidadiidzooígíí --- Wilāyāt al-Muttaḥidah --- Wilāyāt al-Muttaḥidah al-Amirīkīyah --- Wilāyāt al-Muttaḥidah al-Amrīkīyah --- Yhdysvallat --- Yunaeted Stet --- Yunaeted Stet blong Amerika --- ZDA --- Združene države Amerike --- Zʹi͡ednani Derz͡havy Ameryky --- Zjadnośone staty Ameriki --- Zluchanyi͡a Shtaty Ameryki --- Zlucheni Derz͡havy --- ZSA
Choose an application
Annotation
Choose an application
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will
Computer security --- Data protection --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Electronic data processing --- Security systems --- Hacking
Choose an application
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and
Computer security. --- Reverse engineering. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Engineering --- Data protection --- Security systems --- Hacking --- Information Technology --- General and Others
Choose an application
The incredible low maintenance costs of Snort combined with its powerful security features make it one of the fastest growing IDSs within corporate IT departments. Snort 2.0 Intrusion Detection is the first book dealing with the Snort IDS and is written by a member of Snort.org. Readers will receive valuable insight to the code base of Snort and in-depth tutorials of complex installation, configuration, and troubleshooting scenarios. The primary reader will be an individual who has a working knowledge of the TCP/IP protocol, expertise in some arena of IT infrastructure, and is
681.3*D46 --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Contains audio-visual material --- Computer networks --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- Protection --- Security measures
Choose an application
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented
Computer networks --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Security measures. --- Protection --- Security measures
Choose an application
Focusing on vulnerability and security code, this book is an educational reference for security professionals and software developers. It accompanies a CD, which contains a copy of the Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that are used to create security programs and scripts.
Choose an application
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book. The book will be accompanied with a FREE COMPANION CD containing both commented
Computer. Automation --- Computer networks --- Computer security. --- Security measures.
Choose an application
Property --- Right of property --- Public lands --- Common good --- History. --- Good, Common --- Public good --- Lands, Public --- Ownership of property --- Private ownership of property, Right of --- Private property, Right of --- Property, Right of --- Property rights --- Right of private ownership of property --- Right of private property --- Right to property --- Law and legislation --- Political science --- Consensus (Social sciences) --- Justice --- Public interest --- Land use --- Public domain --- Crown lands --- Natural resources, Communal --- Civil rights --- Economics --- Possession (Law) --- Things (Law) --- Wealth --- Primitive property
Choose an application
Covers in detail the five most important disciplines for security professionals and software developers: coding, sockets, shellocode, porting applications, and coding security tools. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel. 5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications. *Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits. *Perform zero-day exploit forensics by reverse engineering malicious code. *Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks.
Listing 1 - 10 of 18 | << page >> |
Sort by
|