
ilość książek w kategorii: 5020
![]() |
How to Cheat at Securing Linux
ISBN: 9781597492072 / Angielski / Miękka / 2007 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system. This book teaches Linux system administrators how to protect their servers from malicious threats. As with any technologies, increased usage results in increased attention from malicious hackers. For years a myth existed that Windows was inherently less secure than Linux, because there were significantly more attacks against Windows machines than Linux....
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space ...
|
cena:
286,57 |
![]() |
Seven Deadliest Social Network Attacks
ISBN: 9781597495455 / Angielski / Miękka / 2010 / 192 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make... Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pin... |
cena:
151,69 |
![]() |
thor's microsoft security bible: a collection of practical security techniques
ISBN: 9781597495721 / Angielski / Twarda / 2011 / 315 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples. This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational... Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical ... |
cena:
203,26 |
![]() |
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
ISBN: 9781597496513 / Angielski / Miękka / 2011 / 432 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis require d. this book is ideal for the classroom as it teaches readers not only how to forensically acquire Android devices but also how to... Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools yo... |
cena:
249,73 |
![]() |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
ISBN: 9781597499514 / Angielski / Miękka / 2012 / 273 str. Termin realizacji zamówienia: ok. 30 dni roboczych. How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this... How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web App... |
cena:
195,86 |
![]() |
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
ISBN: 9781597499859 / Angielski / Miękka / 2013 / 320 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in... Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensic... |
cena:
215,45 |
![]() |
Unified Communications Forensics: Anatomy of Common Uc Attacks
ISBN: 9781597499927 / Angielski / Miękka / 2013 / 156 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: - analysis of forensic artifacts in common UC attacks - an in-depth look at established UC technologies and attack exploits - hands-on understanding of UC attack vectors... Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate t... |
cena:
171,37 |
![]() |
Risk Management Framework: A Lab-Based Approach to Securing Information Systems
ISBN: 9781597499958 / Angielski / Miękka / 2013 / 316 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly... The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation.... |
cena:
230,14 |
![]() |
Computer Incident Response and Forensics Team Management
ISBN: 9781597499965 / Angielski / Miękka / 2013 / 334 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including... Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response...
|
cena:
215,45 |
![]() |
Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure
ISBN: 9781597499989 / Angielski / Miękka / 2013 / 202 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of... Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and... |
cena:
215,45 |
![]() |
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet
ISBN: 9781606503003 / Angielski / Twarda / 2011 / 222 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward...
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes...
|
cena:
385,35 |
![]() |
Nagios Core Administrators Cookbook
ISBN: 9781849515566 / Angielski / Miękka / 2012 / 366 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
|
cena:
237,33 |
![]() |
Metasploit Penetration Testing Cookbook
ISBN: 9781849517423 / Angielski / Miękka / 2012 / 268 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc. Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes Avail of exclusive coverage of antivirus bypassing techniques using metasploit Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc. Build and...
What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test p...
|
cena:
237,33 |
![]() |
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
ISBN: 9781849517744 / Angielski / Miękka / 2012 / 414 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
|
cena:
284,81 |
![]() |
Net Neutrality: Towards a Co-Regulatory Solution
ISBN: 9781849660068 / Angielski / Twarda / 2010 / 208 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs, as a whole, have incentives to discriminate between content for matters such as network management of spam, to secure... Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discr... |
cena:
538,76 |
![]() |
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
ISBN: 9781849685962 / Angielski / Miękka / 2013 / 324 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must...
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It ...
|
cena:
211,44 |
![]() |
Introduction to Modern Information Retrieval
ISBN: 9781856046947 / Angielski / Miękka / 2010 / 528 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use and knowledge-based systems, explains the theory, techniques and tools of traditional approaches to the organization and processing of information.
This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use...
|
cena:
342,85 |
![]() |
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
ISBN: 9781893939943 / Angielski / Miękka / 2012 / 986 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing...
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
|
cena:
545,52 |
![]() |
Essential Information Security
ISBN: 9789087537364 / Angielski / Miękka / 2013 / 1 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south. Every new security practitioner should start with this book, which covers the...
This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private da...
|
cena:
302,97 |
![]() |
Big Data Management, Technologies, and Applications
ISBN: 9781466646995 / Angielski / Twarda / 2013 / 342 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternative management and processing methods have to be created to handle this complex and unstructured data size. Big Data Management, Technologies, and Applications discusses the exponential growth of information size and the innovative methods for data capture, storage, sharing, and analysis for big data. With its prevalence, this collection of articles on big data methodologies and technologies are beneficial for IT workers, researchers, students,...
Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternat...
|
cena:
896,90 |