
ilość książek w kategorii: 5020
![]() |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 2011 / 352 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
cena:
200,38 |
![]() |
Hacking Exposed 7
ISBN: 9780071780285 / Angielski / Miękka / 2012 / 768 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the... The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s... |
cena:
235,06 |
![]() |
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
ISBN: 9780071790390 / Angielski / Miękka / 2012 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.... Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in ... |
cena:
281,31 |
![]() |
Malware, Rootkits & Botnets
ISBN: 9780071792066 / Angielski / Miękka / 2012 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
cena:
200,38 |
![]() |
Cryptography: Infosec Pro Guide
ISBN: 9780071794251 / Angielski / Miękka / 2013 / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers... Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings ... |
cena:
154,14 |
![]() |
Network Security a Beginner's Guide, Third Edition
ISBN: 9780071795708 / Angielski / Miękka / 2012 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption... Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certifi... |
cena:
188,82 |
![]() |
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition
ISBN: 9780071798761 / Angielski / Miękka / 2013 / 560 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast "The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up... The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th... |
cena:
235,06 |
![]() |
Oracle Database 12c Install, Configure & Maintain Like a Professional
ISBN: 9780071799331 / Angielski / Miękka / 2013 / 472 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master the Fundamentals of Oracle Database 12c
Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core database concepts, the role of the administrator, and enterprise database capabilities. Oracle Database 12c: Install, Configure & Maintain Like a Professional walks you through database configuration, administration, programming, backup and recovery, and high availability. You'll get in-depth introductions to SQL and PL/SQL as well as important information on managing large databases and using Oracle's engineered systems. This essential... Master the Fundamentals of Oracle Database 12c
Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core dat... |
cena:
134,87 |
![]() |
Anti-Hacker Tool Kit, Fourth Edition
ISBN: 9780071800143 / Angielski / Miękka / 2014 / 624 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to... Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,... |
cena:
211,94 |
![]() |
Hacking Exposed Mobile: Security Secrets & Solutions
ISBN: 9780071817011 / Angielski / Miękka / 2013 / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior... Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The autho... |
cena:
235,06 |
![]() |
Computer Security: 20 Things Every Employee Should Know
ISBN: 9780072262827 / Angielski / Miękka / 2005 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to keep corporate data and systems secure. This guide includes Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; and E-mail.
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to ke...
|
cena:
92,62 |
![]() |
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
ISBN: 9780124047372 / Angielski / Miękka / 2012 / 150 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks... The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book ex... |
cena:
117,50 |
![]() |
Fisma Compliance Handbook: Second Edition
ISBN: 9780124058712 / Angielski / Miękka / 2013 / 350 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a... This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition ... |
cena:
269,33 |
![]() |
Introduction to Cyber-Warfare: A Multidisciplinary Approach
ISBN: 9780124078147 / Angielski / Miękka / 2013 / 318 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world ...
|
cena:
181,17 |
![]() |
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
ISBN: 9780124095045 / Angielski / Miękka / 2012 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they... Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. |
cena:
113,93 |
![]() |
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
ISBN: 9780124095052 / Angielski / Miękka / 2012 / 48 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find... Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Key... |
cena:
113,93 |
![]() |
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
ISBN: 9780124095069 / Angielski / Miękka / 2012 / 28 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate... Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.... |
cena:
113,93 |
![]() |
Crisis Management at the Speed of the Internet: Trend Report
ISBN: 9780124115873 / Angielski / Miękka / 2013 / 36 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster--even if the viral information isn't factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical,... Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful im... |
cena:
78,32 |
![]() |
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
ISBN: 9780124166721 / Angielski / Miękka / 2013 / 306 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to... Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, batt... |
cena:
146,88 |
![]() |
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
ISBN: 9780313360077 / Angielski / Twarda / 2009 / 160 str. Termin realizacji zamówienia: ok. 30 dni roboczych. In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and... In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and networ... |
cena:
283,55 |