
ilość książek w kategorii: 5048
![]() |
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
ISBN: 9781118810118 / Angielski / Miękka / 2014 / 312 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with... Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neim... |
cena:
248,88 |
![]() |
Network Security, Firewalls and VPNs
ISBN: 9781284031676 / Angielski / Miękka / 2013 / 490 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Field, Network Security, Firewalls, And Vpns, Second Edition Provides A Unique, In-Depth Look At The Major Business Challenges And Threats That Are Introduced When An Organization'S Network Is Connected To The Public Internet. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of Network Security Basics, Including How Hackers Access Online Networks And The Use Of Firewalls And Vpns To Provide Security Countermeasures....
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Fiel...
|
cena:
398,20 |
![]() |
Hacker Techniques, Tools, and Incident Handling
ISBN: 9781284031713 / Angielski / Miękka / 2013 / 500 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Needs To Know About Hackers And Computer Criminals Who Break Into Networks, Steal Information, And Corrupt Data. It Goes On To Review The Technical Overview Of Hacking: How Attacks Target Networks And The Methodology They Follow. The Final Section Studies Those Methods That Are Most Effective When Dealing With Hacking Attacks, Especially In An Age Of Increased Reliance On The Web. Written By A Subject Matter Expert With Numerous Real-World Examples,...
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Need...
|
cena:
378,29 |
![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 2013 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
214,89 |
![]() |
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
ISBN: 9780071494267 / Angielski / Miękka / 2007 / 451 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and... The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello... |
cena:
266,32 |
![]() |
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line
ISBN: 9780071599238 / Angielski / Miękka / 2008 / 308 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a detailed implementation plan. You will find strategies for reducing power needs, procuring energy from alternative sources, utilizing virtualization technologies, and managing sustainable development. Case studies highlighting successful green IT... Reduce the environmental and budgetary impact of your IT infrastructure This groundbreaking work offers a complete roadmap f... |
cena:
156,66 |
![]() |
Mobile Application Security
ISBN: 9780071633567 / Angielski / Miękka / 2010 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this... Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from th... |
cena:
238,91 |
![]() |
Security Information and Event Management (SIEM) Implementation
ISBN: 9780071701099 / Angielski / Miękka / 2010 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM... Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this author... |
cena:
328,99 |
![]() |
Hacking Exposed Web Applications, Third Edition
ISBN: 9780071740647 / Angielski / Miękka / 2010 / 482 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development... The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering ... |
cena:
254,57 |
![]() |
Designing an IAM Framework with Oracle Identity and Access Management Suite
ISBN: 9780071741378 / Angielski / Miękka / 2010 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business... Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the... |
cena:
215,41 |
![]() |
Computer Forensics InfoSec Pro Guide
ISBN: 9780071742450 / Angielski / Miękka / 2013 / 344 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from... Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to... |
cena:
172,33 |
![]() |
Wireless Network Security a Beginner's Guide
ISBN: 9780071760942 / Angielski / Miękka / 2012 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks,... Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wire... |
cena:
164,49 |
![]() |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 2012 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
cena:
203,66 |
![]() |
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap
ISBN: 9780071772518 / Angielski / Miękka / 2012 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across... Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cut... |
cena:
285,90 |
![]() |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 2011 / 352 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
cena:
203,66 |
![]() |
Hacking Exposed 7
ISBN: 9780071780285 / Angielski / Miękka / 2012 / 768 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the... The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s... |
cena:
238,91 |
![]() |
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
ISBN: 9780071790390 / Angielski / Miękka / 2012 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.... Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in ... |
cena:
285,90 |
![]() |
Malware, Rootkits & Botnets
ISBN: 9780071792066 / Angielski / Miękka / 2012 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
cena:
203,66 |
![]() |
Cryptography: Infosec Pro Guide
ISBN: 9780071794251 / Angielski / Miękka / 2013 / 320 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers... Security Smarts for the Self-Guided IT Professional
This complete, practical resource for security and IT professionals presents the underpinnings ... |
cena:
156,66 |
![]() |
Network Security a Beginner's Guide, Third Edition
ISBN: 9780071795708 / Angielski / Miękka / 2012 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption... Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certifi... |
cena:
191,91 |