
ilość książek w kategorii: 5049
![]() |
Cyber Warfare and Cyber Terrorism
ISBN: 9781591409915 / Angielski / Twarda / 2007 / 566 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and...
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologie...
|
cena:
840,04 |
![]() |
Hacking The Xbox
ISBN: 9781593270292 / Angielski / Miękka / 2003 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide. Hacking the Xbox... This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essentia... |
cena:
130,53 |
![]() |
Silence On The Wire
ISBN: 9781593270469 / Angielski / Miękka / 2005 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems. There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. ... |
cena:
208,66 |
![]() |
Understanding Voice Over IP Security
ISBN: 9781596930506 / Angielski / Twarda / 2006 / 261 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
|
cena:
574,79 |
![]() |
Implementing the ISO/IEC 27001 Information Security Management System Standard
ISBN: 9781596931725 / Angielski / Twarda / 2007 / 286 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
|
cena:
443,95 |
![]() |
Cisco PIX Firewalls: Configure / Manage / Troubleshoot
ISBN: 9781597490047 / Angielski / Miękka / 2005 / 576 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
|
cena:
308,41 |
![]() |
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
ISBN: 9781597490054 / Angielski / Miękka / 2005 / 667 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1....
|
cena:
199,45 |
![]() |
Perfect Password: Selection, Protection, Authentication
ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
|
cena:
159,97 |
![]() |
Security Log Management: Identifying Patterns in the Chaos
ISBN: 9781597490429 / Angielski / Miękka / 2006 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
|
cena:
308,41 |
![]() |
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
ISBN: 9781597490481 / Angielski / Miękka / 2006 / 350 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
|
cena:
220,44 |
![]() |
Syngress Force Emerging Threat Analysis: From Mischief to Malicious
ISBN: 9781597490566 / Angielski / Miękka / 2006 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and...
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterp...
|
cena:
308,41 |
![]() |
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat
ISBN: 9781597490641 / Angielski / Miękka / 2006 / 448 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
|
cena:
308,41 |
![]() |
Firewall Policies and VPN Configurations
ISBN: 9781597490887 / Angielski / Miękka / 2006 / 550 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
|
cena:
308,41 |
![]() |
Cryptography for Developers
ISBN: 9781597491044 / Angielski / Miękka / 2006 / 400 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...
The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers b...
|
cena:
374,38 |
![]() |
How to Cheat at Managing Information Security
ISBN: 9781597491105 / Angielski / Miękka / 2006 / 352 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
|
cena:
253,43 |
![]() |
WarDriving and Wireless Penetration Testing
ISBN: 9781597491112 / Angielski / Miękka / 2007 / 446 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
|
cena:
291,91 |
![]() |
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
ISBN: 9781597491297 / Angielski / Miękka / 2007 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
|
cena:
308,41 |
![]() |
Botnets: The Killer Web Applications
ISBN: 9781597491358 / Angielski / Miękka / 2007 / 480 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
|
cena:
308,41 |
![]() |
XSS Attacks: Cross Site Scripting Exploits and Defense
ISBN: 9781597491549 / Angielski / Miękka / 2007 / 480 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
|
cena:
374,38 |
![]() |
Alternate Data Storage Forensics
ISBN: 9781597491631 / Angielski / Miękka / 2007 / 400 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of... Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
|
cena:
374,38 |