- Manufacturer: Praeger
- ReleaseDate: 2010-02-26T00:00:01Z
- NumberOfItems: 1
Defending your web applications against hackers and attackers
The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.
Continue reading “Web Application Defender's Cookbook: Battling Hackers and Protecting Users”
Small Gifts for Music Lovers – Softback Password Journal [$5.50 / £3.59].
IF LOOK INSIDE ISN'T LOADING, SCROLL DOWN TO SEE IN CUSTOMER REVIEWS.
A discrete password journal with our popular Music Carnival design on the cover; it's got sensible sized print, spacious log boxes, and a few added extras, including password setting advice, at the back. We've put a lot of thought in to this book, it's perfect for a small, simple gift:
Dimensions: 20.3 x 12.7 cm / 5 x 8 inches. (A touch smaller than A5 but much bigger than A6. It's small enough to tuck away easily in a bag, drawer or shelf, but it's not tiny, it's much bigger than most pockets.)
-95 pages of good quality white paper to minimize ink bleed-through.
-Just under 400 log boxes, including a few extra at the back for the storage of online purchase reference numbers.
-An advice section on how to set strong, safe passwords is easily accessible at the back.
-Plenty of space. We've allowed the whole page width for writing internet addresses & usernames, and extra space to write your own notes with each record; particularly useful for extra security details such as memorable words. There's also a general notes space at the back for recording modem details or wifi codes for example. So no more cramming!
-A date record box. To prevent confusion if you change a password you can easily keep track of which one is the latest by using the entry date prompt in each log.
-Easy to read with font size 12 or larger throughout.
Cover: Tough matte paperback. Properly bound, so pages won't fall out with use.
Matching Products: Our Music Carnival design is also available on smART bookx notebooks in a variety of sizes, so if you're shopping for gifts you could consider buying a matching set. Search 'music' and 'bookx' on Amazon (don't forget the 'x').
Similar Products: We publish several password journals with the same interior as this one but with other popular cover designs. Search 'password' and 'bookx' on Amazon.
Continue reading “Password Journal: Password Keeper / Music Gifts ( Internet Address Logbook / Diary / Notebook ) (Password Journals – Music (Carnvial))”
"Chilling . . . Extraordinary and urgent." — Washington Post
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”
'Professor Chang s very thoughtful and impressively researched study of cybercrime in the greater China region is an invaluable contribution to the information and analyses available in this area. It not only provides important, and heretofore unavailable data, about the incidence and nature of cybercrime in this region, it also offers insightful suggestions into how this problem can most effectively be controlled. It belongs in the library of anyone interested in this area.'
– Susan Brenner, University of Dayton, US
'East Asia is a heartland of the variegated scams of the cybercrime problem. Yao Chung Chang's book is an innovative application of routine activity theory and regulatory theory to cybercrime prevention across the cybergulf between China and Taiwan. The long march through the scams and across the Taiwan Strait is fascinating. Chang leads us to ponder a wiki cybercrime prevention strategy that might work in such treacherous waters.'
– John Braithwaite, Australian National University
Continue reading “Cybercrime in the Greater China Region: Regulatory Responses and Crime Prevention Across the Taiwan Strait”