
ilość książek w kategorii: 5049
![]() |
Risk Management Framework: A Lab-Based Approach to Securing Information Systems
ISBN: 9781597499958 / Angielski / Miękka / 2013 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly... The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation.... |
cena:
232,95 |
![]() |
Computer Incident Response and Forensics Team Management
ISBN: 9781597499965 / Angielski / Miękka / 2013 / 334 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.
Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including... Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response...
|
cena:
218,09 |
![]() |
Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure
ISBN: 9781597499989 / Angielski / Miękka / 2013 / 202 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of... Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and... |
cena:
218,09 |
![]() |
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet
ISBN: 9781606503003 / Angielski / Twarda / 2011 / 222 str. Termin realizacji zamówienia: ok. 30 dni roboczych. From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward...
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes...
|
cena:
386,69 |
![]() |
Nagios Core Administrators Cookbook
ISBN: 9781849515566 / Angielski / Miękka / 2012 / 366 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
|
cena:
238,62 |
![]() |
Metasploit Penetration Testing Cookbook
ISBN: 9781849517423 / Angielski / Miękka / 2012 / 268 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test popular operating systems such as Windows7, Windows 2008 Server, Ubuntu etc. Get familiar with penetration testing based on client side exploitation techniques with detailed analysis of vulnerabilities and codes Avail of exclusive coverage of antivirus bypassing techniques using metasploit Master post-exploitation techniques such as exploring the target, keystrokes capturing, sniffing, pivoting, setting persistent connections etc. Build and...
What you will learn from this book Set up a complete penetration testing environment using metasploit and virtual machines Learn to penetration-test p...
|
cena:
238,62 |
![]() |
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
ISBN: 9781849517744 / Angielski / Miękka / 2012 / 414 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
|
cena:
286,36 |
![]() |
Net Neutrality: Towards a Co-Regulatory Solution
ISBN: 9781849660068 / Angielski / Twarda / 2010 / 208 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discrimination in that access where the end-user's ISP (or another ISP) blocks that access in part or whole. The suggestion has been that the problem can be resolved by either introducing greater competition, or closely policing conditions for vertically integrated service, such as VOIP. However, that is not the whole story, and ISPs, as a whole, have incentives to discriminate between content for matters such as network management of spam, to secure... Net Neutrality is a very heated and contested policy principle regarding access for content providers to the Internet end-user, and potential discr... |
cena:
594,91 |
![]() |
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
ISBN: 9781849685962 / Angielski / Miękka / 2013 / 324 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must...
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It ...
|
cena:
212,59 |
![]() |
Introduction to Modern Information Retrieval
ISBN: 9781856046947 / Angielski / Miękka / 2010 / 528 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use and knowledge-based systems, explains the theory, techniques and tools of traditional approaches to the organization and processing of information.
This textbook, for students of library and information studies undertaking courses in information retrieval, information organization, information use...
|
cena:
347,04 |
![]() |
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
ISBN: 9781893939943 / Angielski / Miękka / 2012 / 986 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing...
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
|
cena:
548,46 |
![]() |
Essential Information Security
ISBN: 9789087537364 / Angielski / Miękka / 2013 / 1 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private data private, making sure only the people who are authorized have access to the data, making sure your data is always there, always the way you left it, keeping your secrets secret, making sure you trust your sources, and comply with government and industry regulations and standards. It is about managing your risks and keeping the business going when it all goes south. Every new security practitioner should start with this book, which covers the...
This book provides a first introduction into the field of Information security. Information security is about preserving your data, keeping private da...
|
cena:
304,58 |
![]() |
Big Data Management, Technologies, and Applications
ISBN: 9781466646995 / Angielski / Twarda / 2013 / 342 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternative management and processing methods have to be created to handle this complex and unstructured data size. Big Data Management, Technologies, and Applications discusses the exponential growth of information size and the innovative methods for data capture, storage, sharing, and analysis for big data. With its prevalence, this collection of articles on big data methodologies and technologies are beneficial for IT workers, researchers, students,...
Due to the tremendous amount of data generated daily from fields such as business, research, and sciences, big data is everywhere. Therefore, alternat...
|
cena:
901,79 |
![]() |
Profiling Cop-Killers
ISBN: 9781482211412 / Angielski / Miękka / 2014 / 278 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Drawing heavily on original research designed to train police officers to survive deadly encounters, Profiling Cop-Killers examines the sociological history, psychology, and motives of 50 murderers of police officers in 2011. The book identifies the commonalities and differences between groups of offenders by age, examining the previously hidden connections between an offender s lethal choices, criminal history, drug and alcohol usage, and interpersonal relationships. Using Erikson s theory of life span development, the author applies the test of the struggle for... Drawing heavily on original research designed to train police officers to survive deadly encounters, Profiling Cop-Killers examines the soci... |
cena:
143,72 |
![]() |
Practical Paranoia: OS X Security Essentials for Home and Business: The easy step-by-step guide to hardening your OS X security
ISBN: 9781490458380 / Angielski / Miękka / 2013 / 538 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The best-selling, easiest, step-by-step, comprehensive guide to securing your home or business OS X computers. Completely revised and updated for OS X 10.10, Yosemite. Covers all versions of OS X 10.7-10.10 Official workbook for the Practical Paranoia: Security Essentials Workshop. Designed for both workshop use and self-study. The entire workshop is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist. You don't need to be paranoid to know they are out there to get your computer, data, and identity.... The best-selling, easiest, step-by-step, comprehensive guide to securing your home or business OS X computers. Completely revised and updated for O... |
cena:
203,21 |
![]() |
Google Search Secrets
ISBN: 9781555709235 / Angielski / Miękka / 2013 / 224 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Google can be an incredibly powerful tool for research, but the top-of-the-page results are seldom the most beneficial to library users and students, and many of the search engine's most useful features are hidden behind its famously simple interface. Burns and Sauers reveal the secrets of effective Google searches in this invaluable resource showing how to get the most out of the service, with
Google can be an incredibly powerful tool for research, but the top-of-the-page results are seldom the most beneficial to library users and students, ...
|
cena:
218,14 |
![]() |
Mobile Security: How to Secure, Privatize and Recover Your Devices
ISBN: 9781849693608 / Angielski / Miękka / 2013 / 242 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security...
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your p...
|
cena:
212,59 |
![]() |
The Internet Police: How Crime Went Online--And the Cops Followed
ISBN: 9780393349450 / Angielski / Miękka / 2014 / 320 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road.
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find... With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road....
|
cena:
67,79 |
![]() |
Cybercrime and Cyberwarfare
ISBN: 9781848216716 / Angielski / Twarda / 2014 / 176 str. Termin realizacji zamówienia: ok. 30 dni roboczych. In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators' activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the... In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fund...
|
cena:
725,11 |
![]() |
Cuckoo Malware Analysis
ISBN: 9781782169239 / Angielski / Miękka / 2013 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
|
cena:
182,22 |