
ilość książek w kategorii: 5049
![]() |
Conducting Network Penetration and Espionage in a Global Environment
ISBN: 9781482206470 / Angielski / Twarda / 2014 / 599 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Condu... |
cena:
570,12 |
![]() |
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition
ISBN: 9781482230116 / Angielski / Twarda / 2014 / 241 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes what groups in the network are doing to recruit, plan, and carry out attacks worldwide. Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, cover... |
cena:
366,81 |
![]() |
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)
ISBN: 9781483963167 / Angielski / Miękka / 2013 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
44,71 |
![]() |
Instant Ossec Host-Based Intrusion Detection System
ISBN: 9781782167648 / Angielski / Miękka / 2013 / 62 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
130,14 |
![]() |
Vmware View Security Essentials
ISBN: 9781782170082 / Angielski / Miękka / 2013 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered security Secure all your connections between client and desktop
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered ...
|
cena:
190,89 |
![]() |
Information Security Management: Global Challenges in the New Millennium
ISBN: 9781878289780 / Angielski / Miękka / 2012 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This volume offers a compilation of the work of researchers and practitioners addressing issues, trends and challenges facing the management of information security in the third millennium. The book focuses on aspects of information security planning, evaluation, design and implementation.
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This vol...
|
cena:
360,45 |
![]() |
Hacking Exposed Computer Forensics
ISBN: 9780071832502 / Angielski / Twarda / 2009 / 546 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
306,09 |
![]() |
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics
ISBN: 9781466563032 / Angielski / Twarda / 2014 / 334 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies. Injury or loss of life can best be avoided if agencies have accurate knowledge and proper training in less lethal options. Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics discusses how lessons learned from major disturbances have helped law enforcement professionals develop concepts and techniques that police departments can apply to increase successful outcomes, manage risk, and limit liability.... Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies.... |
cena:
520,55 |
![]() |
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets
ISBN: 9781490369396 / Angielski / Miękka / 2013 / 172 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,65 |
![]() |
FAA Computer Security: Recommenations to Address Continuing Weaknesses
ISBN: 9781493627431 / Angielski / Miękka / 2000 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,98 |
![]() |
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud
ISBN: 9780769549781 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
77,30 |
![]() |
Getting Started with Fortigate
ISBN: 9781782178200 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
|
cena:
143,16 |
![]() |
Introduction to Information Security and ISO 27001: 2013
ISBN: 9781849285261 / Angielski / Miękka / 2013 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project....
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An ...
|
cena:
77,26 |
![]() |
Corporate Cyberwar (Mandarin)
ISBN: 9789810713461 / Chiński / Miękka / 2012 / 68 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
81,36 |
![]() |
Corporate Cyberwar
ISBN: 9789810897574 / Angielski / Miękka / 2011 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
81,36 |
![]() |
Detecting and Combating Malicious Email
ISBN: 9780128001103 / Angielski / Miękka / 2014 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The... Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The p... |
cena:
168,76 |
![]() |
Routledge Handbook of Surveillance Studies
ISBN: 9781138026025 / Angielski / Miękka / 2014 / 460 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative Handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life. With a collection of over forty essays from the leading names in... Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency... |
cena:
327,15 |
![]() |
Transnational Security
ISBN: 9781466594449 / Angielski / Twarda / 2014 / 373 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional s agenda. This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters,... Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Prevent... |
cena:
594,91 |
![]() |
Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding
ISBN: 9781466650190 / Angielski / Twarda / 2014 / 363 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able to access the information they desire without having to search through a mountain of unrelated data, so algorithms and methods for effectively seeking out pertinent information are of critical importance. Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding evaluates some of the existing approaches to information retrieval and summarization of digital documents, as well as current research and future...
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able...
|
cena:
901,79 |
![]() |
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques
ISBN: 9781482230727 / Angielski / Twarda / 2014 / 564 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the same sources. Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques reveals how intelligence officers and investigators conduct their tradecraft. You ll learn how... Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandes... |
cena:
768,42 |