ilość książek w kategorii: 3855
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 2004 / 376 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...
|
|
cena:
784,04 zł |
Building an Information Security Awareness Program
ISBN: 9780849301162 / Angielski / Miękka / 2001 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step...
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. ...
|
|
cena:
496,50 zł |
Computer Forensics: Evidence Collection and Management
ISBN: 9780849305610 / Angielski / Twarda / 2007 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.
The book is divided into two major parts for easy... Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit ...
|
|
cena:
470,37 zł |
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
ISBN: 9780849308888 / Angielski / Twarda / 2003 / 896 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
|
|
cena:
627,23 zł |
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
ISBN: 9780849311376 / Angielski / Miękka / 2001 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
|
|
cena:
470,37 zł |
A Practical Guide to Security Engineering and Information Assurance
ISBN: 9780849311635 / Angielski / Twarda / 2001 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to...
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions ...
|
|
cena:
627,23 zł |
Securing Windows Nt/2000: From Policies to Firewalls
ISBN: 9780849312618 / Angielski / Miękka / 2002 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The... In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
|
|
cena:
496,50 zł |
Building a Global Information Assurance Program
ISBN: 9780849313684 / Angielski / Miękka / 2002 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised....
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often ...
|
|
cena:
548,82 zł |
Using the Common Criteria for IT Security Evaluation
ISBN: 9780849314049 / Angielski / Miękka / 2002 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new...
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology i...
|
|
cena:
601,09 zł |
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition
ISBN: 9780849315497 / Angielski / Twarda / 2006 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight... Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security...
|
|
cena:
627,23 zł |
The Ethical Hack: A Framework for Business Value Penetration Testing
ISBN: 9780849316098 / Angielski / Twarda / 2004 / 356 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
|
|
cena:
627,23 zł |
Network Perimeter Security: Building Defense In-Depth
ISBN: 9780849316289 / Angielski / Twarda / 2003 / 420 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
|
|
cena:
627,23 zł |
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition
ISBN: 9780849319587 / Angielski / Twarda / 2004 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
|
|
cena:
627,23 zł |
Strategic Information Security
ISBN: 9780849320415 / Angielski / Twarda / 2003 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.Strategic Information Security integrates the importance of sound security policy with the strategic goals of an...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain t...
|
|
cena:
496,50 zł |
Database and Applications Security: Integrating Information Security and Data Management
ISBN: 9780849322242 / Angielski / Twarda / 2005 / 656 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and... This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
|
|
cena:
627,23 zł |
Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks
ISBN: 9780849322723 / Angielski / Twarda / 2004 / 400 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent...
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that...
|
|
cena:
757,90 zł |
Investigator's Guide to Steganography
ISBN: 9780849324338 / Angielski / Twarda / 2003 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography bega...
|
|
cena:
496,50 zł |
Multimedia Security Handbook
ISBN: 9780849327735 / Angielski / Twarda / 2004 / 832 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the... Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from pi...
|
|
cena:
1071,51 zł |
Curing the Patch Management Headache
ISBN: 9780849328541 / Angielski / Twarda / 2005 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating...
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining th...
|
|
cena:
601,09 zł |
Network Security Technologies
ISBN: 9780849330278 / Angielski / Twarda / 2004 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities,...
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables unde...
|
|
cena:
548,82 zł |