
ilość książek w kategorii: 5131
![]() |
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology
ISBN: 9781402078897 / Angielski / Twarda / 2004 / 411 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
|
cena:
622,39 |
![]() |
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing
ISBN: 9781410792327 / Angielski / Miękka / 2003 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
178,12 |
![]() |
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing
ISBN: 9781410792334 / Angielski / Twarda / 2003 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
223,86 |
![]() |
The Abilene Net
ISBN: 9781418442262 / Angielski / Miękka / 2004 / 244 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,03 |
![]() |
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks
ISBN: 9781420046595 / Angielski / Twarda / 2007 / 504 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.
Drawing from the author s vast experience... An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regardin...
|
cena:
689,87 |
![]() |
Digital Privacy: Theory, Technologies, and Practices
ISBN: 9781420052176 / Angielski / Twarda / 2007 / 492 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in...
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although t...
|
cena:
665,24 |
![]() |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
ISBN: 9781420052190 / Angielski / Twarda / 2007 / 760 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth yet accessible manner.
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting ...
|
cena:
689,87 |
![]() |
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
ISBN: 9781420052855 / Angielski / Twarda / 2009 / 200 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this book presents case studies and tools for monitoring specific items, and offers practical guidance for implementing metrics across an entire organization.
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this b...
|
cena:
433,59 |
![]() |
Data-Driven Block Ciphers for Fast Telecommunication Systems
ISBN: 9781420054118 / Angielski / Twarda / 2007 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Most Progressive and Complete Guide to DDO-Based Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.... The Most Progressive and Complete Guide to DDO-Based Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and C... |
cena:
689,87 |
![]() |
Building an Effective Information Security Policy Architecture
ISBN: 9781420059052 / Angielski / Twarda / 2008 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise.
A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book... Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant ...
|
cena:
714,51 |
![]() |
Handbook of Financial Cryptography and Security
ISBN: 9781420059816 / Angielski / Twarda / 2010 / 631 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more. In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/e-cash. It also looks at the role of cryptography in auctions and... The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es... |
cena:
763,79 |
![]() |
Encyclopedia of Information Assurance - 4 Volume Set (Print)
ISBN: 9781420066203 / Angielski / Twarda / 2010 / 3860 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) p...
|
cena:
6800,16 |
![]() |
Information Security Management Handbook, Volume 2
ISBN: 9781420067088 / Angielski / Twarda / 2008 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT...
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth ...
|
cena:
689,87 |
![]() |
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
ISBN: 9781420069037 / Angielski / Twarda / 2008 / 168 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats ...
|
cena:
379,38 |
![]() |
Algorithmic Cryptanalysis
ISBN: 9781420070026 / Angielski / Twarda / 2009 / 501 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard-Fourier-Walsh transforms, lattice reduction, and Grobner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He includes some hints and solutions to... Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples... |
cena:
714,51 |
![]() |
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications
ISBN: 9781420848243 / Angielski / Twarda / 2005 / 341 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," opera...
|
cena:
228,62 |
![]() |
Computer Security and Telerobotics for Everyone
ISBN: 9781420896824 / Angielski / Miękka / 2005 / 179 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
83,88 |
![]() |
Windows Server 2003 Security Infrastructures: Core Security Features
ISBN: 9781555582838 / Angielski / Miękka / 2004 / 784 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server...
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to l...
|
cena:
295,61 |
![]() |
Firewalls: Jumpstart for Network and Systems Administrators
ISBN: 9781555582975 / Angielski / Miękka / 2004 / 448 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
|
cena:
290,68 |
![]() |
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 9781555582982 / Angielski / Miękka / 2003 / 398 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be ...
|
cena:
266,05 |