CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
ACM SIGCSE Bulletin
Forensic course development: one year later
CITC5 '04 Proceedings of the 5th conference on Information technology education
Computer security and intrusion detection
Crossroads
IEEE Security and Privacy
Stingray: a hands-on approach to learning information security
Proceedings of the 7th conference on Information technology education
Black Hat/White Hat: an aggressive approach to the graduate computer security course
Journal of Computing Sciences in Colleges
Hybrid intelligent systems for network security
Proceedings of the 44th annual Southeast regional conference
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
A normality based method for detecting kernel rootkits
ACM SIGOPS Operating Systems Review
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Windows 2000 Security: Windows 2000 security
Network Security
Hi-index | 0.00 |
This easy-to-use, step-by-step guide will empower network and system administrators to defend their information and computing assets---whether or not they have security experience. In Counter Hack, leading network security expert Edward Skoudis presents comprehensive, insider's explanations of today's most destructive hacker tools and tactics---and specific, proven countermeasures for both UNIX and Windows environments. Whatever your role in protecting network infrastructure and data, Counter Hack delivers proven solutions you can implement right now---and long-term strategies that will improve security for years to come.