Offensive Countermeasures

Offensive Countermeasures
Author: John Strand
Publisher: CreateSpace
Total Pages: 238
Release: 2013-07-08
Genre: Computers
ISBN: 9781490945064

Tired of playing catchup with hackers? Does it ever seem they have all of the cool tools? Does it seem like defending a network is just not fun? This books introduces new cyber-security defensive tactics to annoy attackers, gain attribution and insight on who and where they are. It discusses how to attack attackers in a way which is legal and incredibly useful.

Moving Targets

Moving Targets
Author: Scott Douglas Sagan
Publisher: Princeton University Press
Total Pages: 252
Release: 2020-11-10
Genre: Political Science
ISBN: 0691221758

In what Stanley Hoffmann, writing in The New York Review of Books, has called a "fine analysis and critique of American targeting policies," Sagan looks more at the operational side of nuclear strategy than previous analysts have done, seeking to bridge the gap between theory and practice.

Web Application Security

Web Application Security
Author: Andrew Hoffman
Publisher: O'Reilly Media
Total Pages: 330
Release: 2020-03-02
Genre: Computers
ISBN: 1492053082

While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, introduces three pillars of web application security: recon, offense, and defense. You’ll learn methods for effectively researching and analyzing modern web applications—including those you don’t have direct access to. You’ll also learn how to break into web applications using the latest hacking techniques. Finally, you’ll learn how to develop mitigations for use in your own web applications to protect against hackers. Explore common vulnerabilities plaguing today's web applications Learn essential hacking techniques attackers use to exploit applications Map and document web applications for which you don’t have direct access Develop and deploy customized exploits that can bypass common defenses Develop and deploy mitigations to protect your applications against hackers Integrate secure coding best practices into your development lifecycle Get practical tips to help you improve the overall security of your web applications

Perspectives On Strategic Defense

Perspectives On Strategic Defense
Author: Steven W Guerrier
Publisher: Routledge
Total Pages: 306
Release: 2019-05-28
Genre: Political Science
ISBN: 1000301583

Bringing together proponents and opponents of the Strategic Defense Initiative, this book includes original essays by leading experts on every aspect of the issue. The collection provides a valuable introduction to the many complex questions involved in any serious consideration of the SDI. The contributors explore such issues as the strategic impl

Nuclear Test Ban Treaty

Nuclear Test Ban Treaty
Author: United States. Congress. Senate. Committee on Foreign Relations
Publisher:
Total Pages: 1052
Release: 1963
Genre: Nuclear disarmament
ISBN:

Nuclear Test Ban Treaty

Nuclear Test Ban Treaty
Author: United States. Congress. Senate. Foreign Relations
Publisher:
Total Pages: 1046
Release: 1963
Genre:
ISBN:

Hearings and Reports on Atomic Energy

Hearings and Reports on Atomic Energy
Author: United States. Congress. Joint Committee on Atomic Energy
Publisher:
Total Pages: 1170
Release: 1963
Genre: Nuclear energy
ISBN: