
ilość książek w kategorii: 5131
![]() |
Cyber Adversary Characterization: Auditing the Hacker Mind
ISBN: 9781931836111 / Angielski / Miękka / 2004 / 512 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could...
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing c...
|
cena:
305,17 |
![]() |
Aggressive Network Self-Defense
ISBN: 9781931836203 / Angielski / Miękka / 2005 / 560 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking,...
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive co...
|
cena:
305,17 |
![]() |
CYA Securing Exchange Server 2003
ISBN: 9781931836241 / Angielski / Miękka / 2004 / 352 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars throughout, which present valuable cost/benefit analyses of...
A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is org...
|
cena:
250,78 |
![]() |
Cisco Security Specialists Guide to PIX Firewall
ISBN: 9781931836630 / Angielski / Miękka / 2003 / 608 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device,... Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployme... |
cena:
370,44 |
![]() |
Configuring Symantec AntiVirus Enterprise Edition
ISBN: 9781931836814 / Angielski / Miękka / 2002 / 800 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications. Configuring Symantec AntiVirus... This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise... |
cena:
370,44 |
![]() |
Configuring Netscreen Firewalls
ISBN: 9781932266399 / Angielski / Miękka / 2004 / 702 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security...
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ...
|
cena:
178,06 |
![]() |
Intrusion Prevention and Active Response: Deploying Network and Host IPS
ISBN: 9781932266474 / Angielski / Miękka / 2005 / 550 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on var...
|
cena:
305,17 |
![]() |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
ISBN: 9781932266696 / Angielski / Miękka / 2003 / 656 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products... Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads... |
cena:
348,68 |
![]() |
Software Piracy Exposed
ISBN: 9781932266986 / Angielski / Miękka / 2005 / 310 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book...
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copy...
|
cena:
163,22 |
![]() |
Introduction to Database and Knowledge-Base Systems
ISBN: 9789810206192 / Angielski / Twarda / 1992 / 344 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Aims to provide a comprehensive yet concise coverage of the concepts and technology of database systems and their evolution into knowledge-bases. The traditional material on database systems at senior undergraduate level is covered. An understanding of concepts is emphasized.
Aims to provide a comprehensive yet concise coverage of the concepts and technology of database systems and their evolution into knowledge-bases. The ...
|
cena:
489,81 |
![]() |
Introduction to Database and Knowledge-Base Systems
ISBN: 9789810206208 / Angielski / Miękka / 1992 / 344 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Aims to provide a comprehensive yet concise coverage of the concepts and technology of database systems and their evolution into knowledge-bases. The traditional material on database systems at senior undergraduate level is covered. An understanding of concepts is emphasized.
Aims to provide a comprehensive yet concise coverage of the concepts and technology of database systems and their evolution into knowledge-bases. The ...
|
cena:
257,27 |
![]() |
Research and Practical Issues in Databases: Proceedings of the 3rd Australian Database Conference, Melbourne, 3-4 February 1992
ISBN: 9789810209520 / Angielski / Twarda / 1992 / 369 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Contains original papers which present recent developments in databases and knowledge based systems, and their applications to practical problems. Topics covered include databases and temporal databases, object-oriented modelling, object-oriented databases, deductive databases, distributed database and information systems, database design issues and intelligent databases. The papers aim to reflect the importance of databases and the work being done on them.
Contains original papers which present recent developments in databases and knowledge based systems, and their applications to practical problems. Top...
|
cena:
593,71 |
![]() |
Advances in Information Storage Systems: Selected Papers from the International Conference on Micromechatronics for Information and Precision Equipmen
ISBN: 9789810236168 / Angielski / Twarda / 1999 / 384 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Volume 9 of "Advances in Information Storage Systems" contains selected papers regarding not only information storage but also information equipment in general and related technologies. The papers were presented at the International Conference on Micromechatronics for Information and Precision Equipment (MIPE '97). This conference was held in Tokyo, Japan, from 20 to 23 July 1997, as one of the memorial events of the Centennial Grand Congress of the Japan Society of Mechanical Engineers. Information and precision equipment is fast-changing high technology, and is necessary for the development...
Volume 9 of "Advances in Information Storage Systems" contains selected papers regarding not only information storage but also information equipment i...
|
cena:
603,60 |
![]() |
String Searching Algorithms
ISBN: 9789810237035 / Angielski / Miękka / 1994 / 256 str. Termin realizacji zamówienia: ok. 30 dni roboczych. A bibliographic overview of string searching and an anthology of descriptions of the principal algorithms available. Topics covered include methods for finding exact and approximate string matches, calculating "edit" distances between strings, and finding common sequences.
A bibliographic overview of string searching and an anthology of descriptions of the principal algorithms available. Topics covered include methods fo...
|
cena:
178,11 |
![]() |
Basics of Contemporary Cryptography for It Practitioners
ISBN: 9789812564054 / Angielski / Twarda / 2005 / 208 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course.
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conve...
|
cena:
405,70 |
![]() |
Security in Distributed and Networking Systems
ISBN: 9789812708076 / Angielski / Twarda / 2007 / 512 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
|
cena:
791,62 |
![]() |
Secure Computer and Network Systems: Modeling, Analysis and Design
ISBN: 9780470023242 / Angielski / Twarda / 2008 / 354 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.
This book presents quantitative modeling and... Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...
|
cena:
603,87 |
![]() |
Security and Software for Cybercafes
ISBN: 9781599049038 / Angielski / Twarda / 2008 / 360 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
|
cena:
930,07 |
![]() |
Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings
ISBN: 9783540747345 / Angielski / Miękka / 2007 / 488 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received...
CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) an...
|
cena:
202,66 |
![]() |
Security in Wireless Mesh Networks
ISBN: 9780849382505 / Angielski / Twarda / 2008 / 552 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.
Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include... Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
|
cena:
667,93 |