Wi-Fi Security
ISBN: 9780071410731 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real ones, and arming investors with the facts they need to make informed decisions. This guide to understanding options includes such new material as references to online sites relevant to options investors; information on how to pick brokerage firms; detailed explanations of risk; bailout points; how to pick stocks for options investing; and how put options can enhance portfolio returns. This fifth edition also contains examples, updated charts, and...
In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real on...
|
|
cena:
259,78 zł |
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
ISBN: 9780071494618 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and... Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.... |
|
cena:
219,49 zł |
Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios
ISBN: 9780072193848 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the... "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, secu...
|
|
cena:
156,18 zł |
XML Security
ISBN: 9780072193992 / Angielski / Miękka / 379 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
|
|
cena:
308,13 zł |
McOmmerce Security: A Beginner's Guide
ISBN: 9780072194609 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies,... Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to inc... |
|
cena:
206,83 zł |
Biometrics
ISBN: 9780072222272 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something you do (signature) and something you are (fingerprint).
This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something ...
|
|
cena:
257,48 zł |
Wireless Security
ISBN: 9780072222869 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a security system to protect your wireless network and keep hackers out.
Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a...
|
|
cena:
257,48 zł |
Check Point VPN-1/Fire Wall-1 NG Administration
ISBN: 9780072223422 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. This work includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.
Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Th...
|
|
cena:
257,48 zł |
Windows XP Professional Security
ISBN: 9780072226027 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows XP Professional.
Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows X...
|
|
cena:
257,48 zł |
Hardening Linux
ISBN: 9780072254976 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.
Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the firs...
|
|
cena:
206,83 zł |
Hardening Network Infrastructure
ISBN: 9780072255027 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows network administrators and IT pros how to harden their network infrastructure against hackers.
Shows network administrators and IT pros how to harden their network infrastructure against hackers.
|
|
cena:
206,83 zł |
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 9780072259179 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed method...
|
|
cena:
270,14 zł |
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
ISBN: 9780072263046 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP,... The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security ... |
|
cena:
270,14 zł |
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
ISBN: 9780121604523 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that...
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, ...
|
|
cena:
273,04 zł |
Engaging Privacy and Information Technology in a Digital Age
ISBN: 9780309103923 / Angielski / Twarda / 430 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in... Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for colle... |
|
cena:
260,85 zł |
Hacking: Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security: (How to Hack, Compute
ISBN: 9781517245399 / Angielski / Miękka / 26 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security
This hacking guidebook is your travelling bag of tricks with step-by-step tutorials on different ethical hacking techniques. The book lends you a hacker's mindset, while equipping you with hacker "under system" tricks to help you thwart hack attacks. It exposes a number of easy-to-follow hacking secrets and other fundamental concepts all under one cover. It's a powerful source of information for those who are just starting off as ethical hackers or defensive coders. If you... Hacking Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security
This hacking guidebook is you... |
|
cena:
39,67 zł |
Access Control Systems: Security, Identity Management and Trust Models
ISBN: 9780387004457 / Angielski / Twarda / 262 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming systems security and the theory behind access control models, and addresses emerging access control mechanisms. This essential resource for professionals and advanced students in security programming and system design introduces the foundations of programming... |
|
cena:
388,20 zł |
Optical and Digital Techniques for Information Security
ISBN: 9780387206165 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these...
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspec...
|
|
cena:
388,20 zł |
Security in E-Learning
ISBN: 9780387243412 / Angielski / Twarda / 185 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this topic. Security in E-Learning discusses typical threats to e-learning projects and introduces how these issues have been and should be addressed. This knowledge is essential to conduct a security risk analysis effectively, because participants need to be aware of common threats, protection mechanisms and effort/cost issues. Based on the security risk analysis, appropriate preventive measures are thoroughly discussed in this... As e-learning increases in popularity and reach, more people are taking online courses and thus need to understand security issues relevant to this... |
|
cena:
388,20 zł |
Network Security Policies and Procedures
ISBN: 9780387309378 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal. This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization s security and will... Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and P... |
|
cena:
388,20 zł |