
ilość książek w kategorii: 5007
![]() |
Mastering FreeBSD and OpenBSD Security
ISBN: 9780596006266 / Angielski / Miękka / 2005 / 445 str. Termin realizacji zamówienia: ok. 30 dni roboczych. FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named... FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide sig... |
cena:
205,75 |
![]() |
Windows Server Hacks: 100 Industrial-Strength Tips & Tools
ISBN: 9780596006471 / Angielski / Miękka / 2004 / 357 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script But what about the other ten percent of the time? While it's true that most... One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, cons... |
cena:
115,25 |
![]() |
Managing Security with Snort and IDS Tools
ISBN: 9780596006617 / Angielski / Miękka / 2004 / 269 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the... Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t... |
cena:
153,53 |
![]() |
Computer Security Basics: Computer Security
ISBN: 9780596006693 / Angielski / Miękka / 2006 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security... This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamenta... |
cena:
172,89 |
![]() |
SpamAssassin
ISBN: 9780596007072 / Angielski / Miękka / 2004 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation, the pressure is on system administrators to find a solution to this massive problem in-house. And fast.Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too... The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health produ... |
cena:
115,25 |
![]() |
Digital Identity: Unmasking Identity Management Architecture (Ima)
ISBN: 9780596008789 / Angielski / Miękka / 2005 / 256 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with... The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. ... |
cena:
134,32 |
![]() |
Ssh, the Secure Shell: The Definitive Guide: The Definitive Guide
ISBN: 9780596008956 / Angielski / Miękka / 2005 / 670 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest... Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption fo... |
cena:
172,89 |
![]() |
Security Power Tools
ISBN: 9780596009632 / Angielski / Miękka / 2007 / 860 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec... |
cena:
230,54 |
![]() |
Internet Forensics
ISBN: 9780596100063 / Angielski / Miękka / 2005 / 242 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it. This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer... Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card ... |
cena:
160,61 |
![]() |
Backup & Recovery: Inexpensive Backup Solutions for Open Systems
ISBN: 9780596102463 / Angielski / Miękka / 2007 / 760 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material. Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA,... Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various database... |
cena:
211,32 |
![]() |
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators
ISBN: 9780596510039 / Angielski / Miękka / 2008 / 842 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ... |
cena:
226,33 |
![]() |
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 9780596527631 / Angielski / Miękka / 2006 / 480 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security... In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, netw... |
cena:
153,68 |
![]() |
Maximum Windows 2000 Security
ISBN: 9780672319655 / Angielski / Miękka / 2001 / 624 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. Topics include: Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. To... |
cena:
211,32 |
![]() |
Microsoft ISA Server 2000
ISBN: 9780672321009 / Angielski / Miękka / 2001 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple firewall product. By combining enterprise firewall and high-performance Web cache functions, ISA Server provides a common management infrastructure that reduces network complexity and costs. ISA Server protects networks from unauthorized access, inspects traffic, and alerts network administrators to attacks. The readers of this book will receive comprehensive appendices on useful ISA Server information. Readers will find information in this book...
Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple ...
|
cena:
172,89 |
![]() |
Open Source E-mail Security
ISBN: 9780672322372 / Angielski / Miękka / 2001 / 504 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts crucial to stopping spam messages. It presents configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. It also covers advanced security topics.
Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts cruci...
|
cena:
153,68 |
![]() |
Pseudorandomness &Amp; Cryptographic Applications
ISBN: 9780691025469 / Angielski / Miękka / 1996 / 248 str. Termin realizacji zamówienia: ok. 30 dni roboczych. A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to... A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a ran... |
cena:
449,67 |
![]() |
Internet Resources for Leisure and Tourism
ISBN: 9780750646444 / Angielski / Miękka / 1999 / 254 str. Termin realizacji zamówienia: ok. 22 dni roboczych. There is a wealth of useful information for travel and tourism students on the World Wide Web. This volume provides an introduction to the Internet, as well as a complete route guide to free travel and tourism resources available on it.
There is a wealth of useful information for travel and tourism students on the World Wide Web. This volume provides an introduction to the Internet, a...
|
cena:
224,78 |
![]() |
Network Security
ISBN: 9780750650335 / Angielski / Miękka / 2002 / 224 str. Termin realizacji zamówienia: ok. 22 dni roboczych. With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comprehensive review of network security issues with particular relevance to corporate networks from an administrative and user perspective. The book is designed to be particularly suitable for system administrators and users who wish to learn more about the security issues faced by their organization.
With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comp...
|
cena:
278,55 |
![]() |
I-Way Robbery: Crime on the Internet
ISBN: 9780750670296 / Angielski / Miękka / 1999 / 256 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures. I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset... I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as ... |
cena:
549,70 |
![]() |
Netspionage: The Global Threat to Information
ISBN: 9780750672573 / Angielski / Miękka / 2000 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow...
This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information ...
|
cena:
307,32 |