Managing Security with Snort and IDS Tools
ISBN: 9780596006617 / Angielski / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the... Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t... |
|
cena:
173,66 zł |
Computer Security Basics: Computer Security
ISBN: 9780596006693 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security... This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamenta... |
|
cena:
195,57 zł |
Technological Turf Wars: A Case Study of the AntiVirus Industry
ISBN: 9781592138814 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the...
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, techn...
|
|
cena:
304,32 zł |
Technological Turf Wars: A Case Study of the Computer AntiVirus Industry
ISBN: 9781592138821 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives and considers the dynamics within companies by looking at facets such as gender bias and power politics.
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics a...
|
|
cena:
120,62 zł |
Mobile Malware Attacks and Defense
ISBN: 9781597492980 / Angielski / Miękka / 409 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads View attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and Threats Understand the... Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...
|
|
cena:
230,81 zł |
Constraint-based Analysis of Security Properties
ISBN: 9783639071863 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
270,72 zł |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
ISBN: 9781605663265 / Angielski / Twarda / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating...
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-securi...
|
|
cena:
1127,40 zł |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
91,25 zł |
Least Privilege Security for Windows 7, Vista and XP
ISBN: 9781849680042 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
|
|
cena:
321,28 zł |
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
ISBN: 9781609608361 / Angielski / Twarda / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
|
|
cena:
1127,40 zł |
The Psychology of Cyber Crime: Concepts and Principles
ISBN: 9781613503508 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
|
|
cena:
1127,40 zł |
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)
ISBN: 9780615330150 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
|
|
cena:
36,29 zł |
The CEO's Manual on Cyber Security
ISBN: 9780989253598 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
|
|
cena:
68,24 zł |
Hacking
ISBN: 9781365046612 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking... |
|
cena:
172,84 zł |
Malware Narratives: An Introduction
ISBN: 9781908043481 / Angielski / Miękka / 56 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especially in the pattern-driven and pattern-based analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a transcript of Software Diagnostics Services Webinar on the new application of software narratology to malware analysis.
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especi...
|
|
cena:
121,72 zł |
Android Malware
ISBN: 9781461473930 / Angielski / Miękka / 44 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history,... Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their succe... |
|
cena:
194,97 zł |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
238,52 zł |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
|
cena:
226,04 zł |
Hacking Exposed 7
ISBN: 9780071780285 / Angielski / Miękka / 768 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the... The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s... |
|
cena:
265,17 zł |
Malware, Rootkits & Botnets
ISBN: 9780071792066 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
|
cena:
226,04 zł |