
ilość książek w kategorii: 5020
![]() |
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone
ISBN: 9781475097009 / Angielski / Miękka / 2012 / 90 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends,...
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hacker...
|
cena:
32,33 |
![]() |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
cena:
80,88 |
![]() |
Darknet Ecosystems: Surfacing Underground Economies
ISBN: 9781484077016 / Angielski / Miękka / 2013 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. The ability to monitor, track and secure information may be organically increased through the perception that group members are getting something "free" out of the exchange of information. This may likely suggest that underground economies could be influenced, when the concept of "free" lowers the perceived market value of "anonymity." This in turn has the effect of surfacing underground economic activity. Evidence may likely suggest that an...
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. Th...
|
cena:
149,51 |
![]() |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
cena:
80,88 |
![]() |
Privacy: Select Issues & Laws for the 21st Century
ISBN: 9781626184299 / Angielski / Twarda / 2013 / 207 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1346,82 |
![]() |
Threat Modeling: Designing for Security
ISBN: 9781118809990 / Angielski / Miękka / 2014 / 624 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptograph... |
cena:
262,93 |
![]() |
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
ISBN: 9781118810118 / Angielski / Miękka / 2014 / 312 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with... Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neim... |
cena:
244,89 |
![]() |
Network Security, Firewalls and VPNs
ISBN: 9781284031676 / Angielski / Miękka / 2013 / 490 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Field, Network Security, Firewalls, And Vpns, Second Edition Provides A Unique, In-Depth Look At The Major Business Challenges And Threats That Are Introduced When An Organization'S Network Is Connected To The Public Internet. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of Network Security Basics, Including How Hackers Access Online Networks And The Use Of Firewalls And Vpns To Provide Security Countermeasures....
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Fiel...
|
cena:
406,51 |
![]() |
Hacker Techniques, Tools, and Incident Handling
ISBN: 9781284031713 / Angielski / Miękka / 2013 / 500 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Needs To Know About Hackers And Computer Criminals Who Break Into Networks, Steal Information, And Corrupt Data. It Goes On To Review The Technical Overview Of Hacking: How Attacks Target Networks And The Methodology They Follow. The Final Section Studies Those Methods That Are Most Effective When Dealing With Hacking Attacks, Especially In An Age Of Increased Reliance On The Web. Written By A Subject Matter Expert With Numerous Real-World Examples,...
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Need...
|
cena:
386,93 |
![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 2013 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
211,44 |
![]() |
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
ISBN: 9780071494267 / Angielski / Miękka / 2007 / 451 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and... The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello... |
cena:
262,04 |
![]() |
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
ISBN: 9780071599238 / Angielski / Miękka / 2008 / 308 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a detailed implementation plan. You will find strategies for reducing power needs, procuring energy from alternative sources, utilizing virtualization technologies, and managing sustainable development. Case studies highlighting successful green IT... Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap f... |
cena:
154,14 |
![]() |
Mobile Application Security
ISBN: 9780071633567 / Angielski / Miękka / 2010 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this... Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from th... |
cena:
235,06 |
![]() |
Security Information and Event Management (SIEM) Implementation
ISBN: 9780071701099 / Angielski / Miękka / 2010 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM... Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this author... |
cena:
323,69 |
![]() |
Hacking Exposed Web Applications, Third Edition
ISBN: 9780071740647 / Angielski / Miękka / 2010 / 482 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development... The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering ... |
cena:
250,48 |
![]() |
Designing an IAM Framework with Oracle Identity and Access Management Suite
ISBN: 9780071741378 / Angielski / Miękka / 2010 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business... Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the... |
cena:
211,94 |
![]() |
Computer Forensics InfoSec Pro Guide
ISBN: 9780071742450 / Angielski / Miękka / 2013 / 344 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from... Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to... |
cena:
169,55 |
![]() |
Wireless Network Security a Beginner's Guide
ISBN: 9780071760942 / Angielski / Miękka / 2012 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks,... Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wire... |
cena:
161,85 |
![]() |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 2012 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
cena:
200,38 |
![]() |
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap
ISBN: 9780071772518 / Angielski / Miękka / 2012 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across... Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cut... |
cena:
281,31 |