
ilość książek w kategorii: 5011
![]() |
XSS Attacks: Cross Site Scripting Exploits and Defense
ISBN: 9781597491549 / Angielski / Miękka / 2007 / 480 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
|
cena:
365,52 |
![]() |
Alternate Data Storage Forensics
ISBN: 9781597491631 / Angielski / Miękka / 2007 / 400 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of... Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
|
cena:
365,52 |
![]() |
AVIEN Malware Defense Guide for the Enterprise
ISBN: 9781597491648 / Angielski / Miękka / 2007 / 656 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about...
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on ...
|
cena:
365,52 |
![]() |
Zen and the Art of Information Security
ISBN: 9781597491686 / Angielski / Miękka / 2007 / 192 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security underst...
|
cena:
188,45 |
![]() |
How to Cheat at VoIP Security
ISBN: 9781597491693 / Angielski / Miękka / 2007 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different.... The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect in... |
cena:
301,13 |
![]() |
How to Cheat at Configuring Open Source Security Tools
ISBN: 9781597491709 / Angielski / Miękka / 2007 / 528 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that... The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perf... |
cena:
301,13 |
![]() |
Dr. Tom Shinder's ISA Server 2006 Migration Guide
ISBN: 9781597491990 / Angielski / Miękka / 2007 / 637 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange... Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
|
cena:
181,17 |
![]() |
Configuring Sonicwall Firewalls
ISBN: 9781597492508 / Angielski / Miękka / 2006 / 500 str. Termin realizacji zamówienia: ok. 30 dni roboczych. SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals....
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in...
|
cena:
195,86 |
![]() |
Semantic Web Services: Theory, Tools, and Applications
ISBN: 9781599040455 / Angielski / Twarda / 2007 / 353 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive and transportable machine understanding. Semantic Web Services: Theory, Tools and Applications brings contributions from researchers, scientists from both industry and academia, and representatives from different communities to study, understand, and explore the theory, tools, and applications of the semantic Web. Semantic Web Services: Theory, Tools and Applications binds computing involving the semantic Web, ontologies, knowledge management, Web...
The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive an...
|
cena:
841,04 |
![]() |
Advances in Enterprise Information Technology Security
ISBN: 9781599040905 / Angielski / Twarda / 2007 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined.
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterpris...
|
cena:
841,04 |
![]() |
Secure E-Government Web Services
ISBN: 9781599041384 / Angielski / Twarda / 2006 / 335 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
|
cena:
509,47 |
![]() |
Integrating Security and Software Engineering: Advances and Future Vision
ISBN: 9781599041476 / Angielski / Twarda / 2006 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. Integrating Security and Software Engineering: Advances and Future Visions discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and soft...
|
cena:
483,98 |
![]() |
Web Services Security and E-Business
ISBN: 9781599041681 / Angielski / Twarda / 2006 / 394 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems.Web Services Security and E-Business provides insight into uncovering the security...
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access contro...
|
cena:
483,98 |
![]() |
Knowledge Discovery and Data Mining: Challenges and Realities
ISBN: 9781599042527 / Angielski / Twarda / 2007 / 274 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data Mining: Challenges and Realities is the most comprehensive reference publication for researchers and real-world data mining practitioners to advance knowledge discovery from low-quality data. This Premier Reference Source presents in-depth experiences and methodologies, providing theoretical and empirical guidance to users who have suffered from underlying, low-quality data. International experts in the field of data mining have contributed...
Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data M...
|
cena:
841,04 |
![]() |
Contemporary Issues in Database Design and Information Systems Development
ISBN: 9781599042893 / Angielski / Twarda / 2007 / 331 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chap...
|
cena:
509,47 |
![]() |
Cryptography and Security Services: Mechanisms and Applications
ISBN: 9781599048376 / Angielski / Twarda / 2008 / 490 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
|
cena:
509,47 |
![]() |
Handbook of Research on Wireless Security: 2 V
ISBN: 9781599048994 / Angielski / Twarda / 2008 / 934 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless...
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and servic...
|
cena:
2675,70 |
![]() |
The Cryptogic Password Protocol
ISBN: 9781844012510 / Angielski / Miękka / 2004 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome the simple approaches used by the public to manage their passwords and PINs. Imagine if: - You could have different and sophisticated passwords and PINs for each service. - There were no limits to the number of different passwords/PINs you could manage in your mind without having to memorise them. -...
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...?...
|
cena:
55,76 |
![]() |
Security Modeling and Analysis of Mobile Agent Systems
ISBN: 9781860946349 / Angielski / Twarda / 2006 / 212 str. Termin realizacji zamówienia: ok. 30 dni roboczych. A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure...
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse a...
|
cena:
479,98 |
![]() |
Avoiding Project Disaster: Titanic Lessons for It Executives
ISBN: 9781895186734 / Angielski / Miękka / 2006 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
153,11 |