![]() |
Managing Security with Snort & IDS Tools
ISBN: 9780596006617 / Angielski / Miękka / 269 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the... Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t... |
cena:
162,34 zł |
![]() |
Technological Turf Wars: A Case Study of the AntiVirus Industry
ISBN: 9781592138814 / Angielski / Twarda / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that considers corporate culture and the workplace environment of the antivirus industry.Using a qualitative, interdisciplinary approach, which combines organizational and security studies with critical and social analysis of science and technology, Johnston questions the...
In "Technological Turf Wars", Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, techn...
|
cena:
337,46 zł |
![]() |
Technological Turf Wars : A Case Study of the Computer Antivirus Industry
ISBN: 9781592138821 / Angielski / Miękka / 232 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics and profit motives and considers the dynamics within companies by looking at facets such as gender bias and power politics.
Johnston questions the motivations, contradictions and negotiations of antivirus professionals. She examines the tensions between the service ethics a...
|
cena:
133,86 zł |
![]() |
Mobile Malware Attacks and Defense
ISBN: 9781597492980 / Angielski / Miękka / 409 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads View attacks as visible to the end user, including notation of variants. * Timeline of Mobile Hoaxes and Threats Understand the... Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This fir...
|
cena:
235,63 zł |
![]() |
Constraint-Based Analysis of Security Properties
ISBN: 9783639071863 / Angielski / Miękka / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
370,08 zł |
![]() |
Cyber-security and Global Information Assurance : Threat Analysis and Response Solutions
ISBN: 9781605663265 / Angielski / Twarda / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating...
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-securi...
|
cena:
1195,48 zł |
![]() |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
96,75 zł |
![]() |
Least Privilege Security for Windows 7, Vista and XP
ISBN: 9781849680042 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
|
cena:
386,17 zł |
![]() |
Privacy, Intrusion Detection, and Response : Technologies for Protecting Networks
ISBN: 9781609608361 / Angielski / Twarda / 292 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
|
cena:
1195,48 zł |
![]() |
The Psychology of Cyber Crime : Concepts and Principles
ISBN: 9781613503508 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
|
cena:
1195,48 zł |
![]() |
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)
ISBN: 9780615330150 / Angielski / Miękka / 72 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
|
cena:
38,48 zł |
![]() |
# PRIVACY Tweet Book01 : Addressing Privacy Concerns in the Day of Social Media
ISBN: 9781607730880 / Angielski / Miękka / 114 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefore no surprise that privacy online is of such great concern in our connected world. Today, when we conduct so much of our life online--bank transactions, credit card payments, transmission of personal messages and images to friends and family--it is completely understandable that we should be concerned about the privacy of our communication and information.
Privacy concerns in the virtual world are often compounded by lack of information and... Concerns about privacy are not new. Since time immemorial, we humans have valued and guarded our privacy, often jealously or violently. It is therefor...
|
cena:
91,96 zł |
![]() |
The CEO's Manual on Cyber Security
ISBN: 9780989253598 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
|
cena:
72,36 zł |
![]() |
Hacking
ISBN: 9781365046612 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking... |
cena:
194,73 zł |
![]() |
Malware Narratives: An Introduction
ISBN: 9781908043481 / Angielski / Miękka / 56 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especially in the pattern-driven and pattern-based analysis of software logs from complex systems with millions of events, thousands of threads, hundreds of processes and modules. This is a transcript of Software Diagnostics Services Webinar on the new application of software narratology to malware analysis.
Software Narratology, the science of software stories, found its successful application in software diagnostics of abnormal software behaviour, especi...
|
cena:
129,07 zł |
![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
288,08 zł |
![]() |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
cena:
193,60 zł |
![]() |
Malware, Rootkits & Botnets A Beginner's Guide
ISBN: 9780071792066 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
cena:
193,60 zł |
![]() |
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
ISBN: 9780071798761 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast "The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up... The latest techniques for averting UC disaster
"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th... |
cena:
253,52 zł |
![]() |
Anti-Hacker Tool Kit, Fourth Edition
ISBN: 9780071800143 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to... Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,... |
cena:
253,52 zł |