The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Stopping with this site

I am stopping with this site. If you want to take over the site with domain name get in touch, e-mail address below.

The Virtual Bookcase : Shelf Computer security

Security of computer systems

Shelf parts : First Previous Next Last score: 4.0 ++++-
Vote for this book

Shop for this book
The preface stresses that this book is neither about how to attack a Web site, nor how to develop one, but, rather, how to test. Chapter one points out that the Web is a different environment, in terms of software security, because we have desktop machines, not centrally administered, talking to everyone (with much of the traffic being commercial in nature). The authors even point out that issues of error-handling, performance, and ease-of-use all contribute to increased levels of vulnerability. Various attacks designed to obtain information about Web applications, structure, and functions are described in chapter two. For client-side scripting, chapter three notes, any validation done on the client should be untrusted and re- validate... Rest of this review on the detail page
(Review by Rob Slade)
I want to add my review for this book!
Reviews (1) and details of How to Break Web Software: Functional and Security Testing of Web Applications and Web Services score: 5.0 +++++
Vote for this book

Shop for this book
Book description
Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions. * VoIP Isn't Just Another Data Protocol IP teleph... Rest of this review on the detail page
I want to add my review for this book!
Reviews (2) and details of Practical VoIP Security score: 3.5 ++++-
Vote for this book

Shop for this book
A book that lets the reader really experience and feel how computers are broken into and how exploits are written. You don't have to be a programming guru to get the feel for how easy it can be to exploit any simple programming error to get elevated privileges. The book is divided into several sections: programming, programming errors and their exploits, including building exploits that will get through most 'only safe input' filters, networking basics and attacks against network stacks, cryptology and attack methods on cryptologic methods. A good book to get a feel for how fast something innocent can be an entry-point for abuse.
(Review by Koos van den Hout)
I want to add my review for this book!
Reviews (1) and details of Hacking: The Art of Exploitation, 2nd Edition score: 4.0 ++++-
Vote for this book

Shop for this book
A quite readable book about the modern crimes related to the Internet. All those crimes (phishing, advance fee fraud) aren't new but 'real-life' crimes revisited. The book describes a lot of the problems of the modern Internet and discusses solutions. Not trying to find the end-all solution to spam, but discussing pros and cons of the available ideas and what will work and how to make security on the Internet something that the average user understands.
(Review by Koos van den Hout)
I want to add my review for this book!
Reviews (2) and details of The dotCrime Manifesto: How to Stop Internet Crime
Shelf parts : First Previous Next Last
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2022 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement