
ilość książek w kategorii: 5011
![]() |
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
ISBN: 9781591409113 / Angielski / Twarda / 2006 / 406 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field how to create secure environments for the application of technology to serve future needs. This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of ...
|
cena:
458,49 |
![]() |
Privacy Protection for E-Services
ISBN: 9781591409144 / Angielski / Twarda / 2006 / 303 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy pre...
|
cena:
483,98 |
![]() |
Cyber Warfare and Cyber Terrorism
ISBN: 9781591409915 / Angielski / Twarda / 2007 / 566 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and...
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologie...
|
cena:
828,36 |
![]() |
Hacking The Xbox
ISBN: 9781593270292 / Angielski / Miękka / 2003 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide. Hacking the Xbox... This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essentia... |
cena:
127,38 |
![]() |
Silence On The Wire
ISBN: 9781593270469 / Angielski / Miękka / 2005 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems. There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. ... |
cena:
203,64 |
![]() |
Understanding Voice Over IP Security
ISBN: 9781596930506 / Angielski / Twarda / 2006 / 261 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
|
cena:
560,96 |
![]() |
Implementing the ISO/IEC 27001 Information Security Management System Standard
ISBN: 9781596931725 / Angielski / Twarda / 2007 / 286 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
|
cena:
433,26 |
![]() |
Cisco PIX Firewalls: Configure / Manage / Troubleshoot
ISBN: 9781597490047 / Angielski / Miękka / 2005 / 576 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
|
cena:
301,13 |
![]() |
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
ISBN: 9781597490054 / Angielski / Miękka / 2005 / 667 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1....
|
cena:
195,86 |
![]() |
Perfect Password: Selection, Protection, Authentication
ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
|
cena:
156,26 |
![]() |
Security Log Management: Identifying Patterns in the Chaos
ISBN: 9781597490429 / Angielski / Miękka / 2006 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
|
cena:
301,13 |
![]() |
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
ISBN: 9781597490481 / Angielski / Miękka / 2006 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
|
cena:
215,28 |
![]() |
Syngress Force Emerging Threat Analysis: From Mischief to Malicious
ISBN: 9781597490566 / Angielski / Miękka / 2006 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and...
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterp...
|
cena:
301,13 |
![]() |
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat
ISBN: 9781597490641 / Angielski / Miękka / 2006 / 448 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
|
cena:
301,13 |
![]() |
Firewall Policies and VPN Configurations
ISBN: 9781597490887 / Angielski / Miękka / 2006 / 550 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
|
cena:
301,13 |
![]() |
Cryptography for Developers
ISBN: 9781597491044 / Angielski / Miękka / 2006 / 400 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...
The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers b...
|
cena:
365,52 |
![]() |
How to Cheat at Managing Information Security
ISBN: 9781597491105 / Angielski / Miękka / 2006 / 352 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
|
cena:
247,47 |
![]() |
WarDriving and Wireless Penetration Testing
ISBN: 9781597491112 / Angielski / Miękka / 2007 / 446 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
|
cena:
285,03 |
![]() |
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
ISBN: 9781597491297 / Angielski / Miękka / 2007 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
|
cena:
301,13 |
![]() |
Botnets: The Killer Web Applications
ISBN: 9781597491358 / Angielski / Miękka / 2007 / 480 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
|
cena:
301,13 |