Hacking Exposed Windows, 3rd Edition
Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors and contributors many years as security professionals hired to break into the world's largest IT infrastructures. more »
Hacking Exposed Web 2.0
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. more »
Hacking Exposed Linux, 3rd Edition
This authoritative guide will help you secure your Linux network - whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks. more »
Hacking Exposed, 6th Edition
Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.

New and updated material! more »
Hacking Exposed Computer Forensics, 2nd Edition
Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. more »
Hacking Exposed Malware and Rootkits
Providing real-world attacks and detailed countermeasures, this new volume is a comprehensive guide to the "black art" of malware and rootkits. You will learn how to identify and defend against malicious software and dangerous hidden scripts. The book includes practical examples, case studies, and risk ratings - all in the bestselling Hacking Exposed format.

Hacking Exposed: Malware & Rootkits walks you through the processes of analyzing malicious software from start to finish. The book covers different kinds of malware and rootkits, methods of infection, and the latest detection and prevention technologies. more »
Hacking Exposed Wireless, 2nd Edition
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. more »
Hacking Exposed Web Applications, 3rd Edition
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. more »
An Introduction to Object-Oriented Programming with Java, 5th Edition
An Introduction to Object-Oriented Programming with Java takes a full-immersion approach to object-oriented programming. Proper object-oriented design practices are emphasized throughout the book. Students learn how to use the standard classes first, then learn to design their own classes.

Wu uses a gentler approach to teaching students how to design their own classes, separating the coverage into two chapters. GUI coverage is also located independently in the back of the book and can be covered if desired. more »
Oracle E-Business Suite Development & Extensibility Handbook
Transform your Oracle E-Business Suite infrastructure to suit enterprise requirements using the comprehensive development methods in this Oracle Press guide. Oracle E-Business Suite Development & Extensibility Handbook lays out each tool alongside reusable code and step-by-step examples. Learn how to create multiorg objects, integrate Java and PL/SQL, design custom user interfaces, and use Oracle Application Framework and Oracle Workflow. This detailed volume also explains how to work with Oracle XML Gateway, publish dynamic business intelligence reports, and tune your configuration. more »