ilość książek w kategorii: 3854
Hardening Cisco Routers
ISBN: 9780596001667 / Angielski / Miękka / 2002 / 194 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement... |
|
cena:
108,45 zł |
Web Performance Tuning
ISBN: 9780596001728 / Angielski / Miękka / 2002 / 482 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features, and consequently longer waits on the Web. Improved performance has become a critical factor in determining the usability of the Web in general and of individual sites in particular.Web Performance Tuning, 2nd Edition is about getting the best possible performance from the Web. This book isn't just about tuning web server software; it's also about streamlining web content, getting optimal performance from a browser, tuning both client and... As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features,... |
|
cena:
195,57 zł |
Network Security with Openssl: Cryptography for Secure Communications
ISBN: 9780596002701 / Angielski / Miękka / 2002 / 386 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it... Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats... |
|
cena:
173,66 zł |
Linux Security Cookbook
ISBN: 9780596003913 / Angielski / Miękka / 2003 / 336 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of... Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one s... |
|
cena:
176,68 zł |
Secure Programming Cookbook for C & C++
ISBN: 9780596003944 / Angielski / Miękka / 2003 / 792 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks.... |
|
cena:
331,33 zł |
Mastering FreeBSD and OpenBSD Security
ISBN: 9780596006266 / Angielski / Miękka / 2005 / 445 str. Termin realizacji zamówienia: ok. 22 dni roboczych. FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named... FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide sig... |
|
cena:
220,87 zł |
Windows Server Hacks: 100 Industrial-Strength Tips & Tools
ISBN: 9780596006471 / Angielski / Miękka / 2004 / 357 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script But what about the other ten percent of the time? While it's true that most... One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, cons... |
|
cena:
130,37 zł |
Managing Security with Snort and IDS Tools
ISBN: 9780596006617 / Angielski / Miękka / 2004 / 269 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the... Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t... |
|
cena:
173,66 zł |
Computer Security Basics: Computer Security
ISBN: 9780596006693 / Angielski / Miękka / 2006 / 296 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security... This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamenta... |
|
cena:
195,57 zł |
SpamAssassin
ISBN: 9780596007072 / Angielski / Miękka / 2004 / 224 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation, the pressure is on system administrators to find a solution to this massive problem in-house. And fast.Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too... The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health produ... |
|
cena:
130,37 zł |
Digital Identity: Unmasking Identity Management Architecture (Ima)
ISBN: 9780596008789 / Angielski / Miękka / 2005 / 256 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with... The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. ... |
|
cena:
151,92 zł |
Ssh, the Secure Shell: The Definitive Guide: The Definitive Guide
ISBN: 9780596008956 / Angielski / Miękka / 2005 / 670 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest... Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption fo... |
|
cena:
195,57 zł |
Security Power Tools
ISBN: 9780596009632 / Angielski / Miękka / 2007 / 860 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec... |
|
cena:
260,78 zł |
Backup & Recovery: Inexpensive Backup Solutions for Open Systems
ISBN: 9780596102463 / Angielski / Miękka / 2007 / 760 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material. Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA,... Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various database... |
|
cena:
239,04 zł |
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators
ISBN: 9780596510039 / Angielski / Miękka / 2008 / 842 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track. Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ... |
|
cena:
242,96 zł |
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 9780596527631 / Angielski / Miękka / 2006 / 480 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security... In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, netw... |
|
cena:
173,84 zł |
Maximum Windows 2000 Security
ISBN: 9780672319655 / Angielski / Miękka / 2001 / 624 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. Topics include: Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. To... |
|
cena:
239,04 zł |
Microsoft ISA Server 2000
ISBN: 9780672321009 / Angielski / Miękka / 2001 / 336 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple firewall product. By combining enterprise firewall and high-performance Web cache functions, ISA Server provides a common management infrastructure that reduces network complexity and costs. ISA Server protects networks from unauthorized access, inspects traffic, and alerts network administrators to attacks. The readers of this book will receive comprehensive appendices on useful ISA Server information. Readers will find information in this book...
Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple ...
|
|
cena:
195,57 zł |
Open Source E-mail Security
ISBN: 9780672322372 / Angielski / Miękka / 2001 / 504 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts crucial to stopping spam messages. It presents configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. It also covers advanced security topics.
Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts cruci...
|
|
cena:
173,84 zł |
Pseudorandomness &Amp; Cryptographic Applications
ISBN: 9780691025469 / Angielski / Miękka / 1996 / 248 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack. There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to... A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a ran... |
|
cena:
486,02 zł |