Wireless Network Security
ISBN: 9780387280400 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles... |
|
cena:
586,33 zł |
Botnet Detection: Countering the Largest Security Threat
ISBN: 9780387687667 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help ... |
|
cena:
390,87 zł |
Critical Information Infrastructures: Resilience and Protection
ISBN: 9780387718613 / Angielski / Twarda / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would...
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It...
|
|
cena:
390,87 zł |
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen
ISBN: 9780387723662 / Angielski / Twarda / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches...
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Securit...
|
|
cena:
390,87 zł |
Security for Telecommunications Networks
ISBN: 9780387724416 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in... This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunicati... |
|
cena:
469,06 zł |
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac
ISBN: 9780387732688 / Angielski / Twarda / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings... International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform... |
|
cena:
195,42 zł |
Vulnerability Analysis and Defense for the Internet
ISBN: 9780387743899 / Angielski / Twarda / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
|
|
cena:
390,87 zł |
Network Security Fundamentals
ISBN: 9780470101926 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You can get there
Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed. With this book, you will be able to: * Understand basic terminology and concepts related to security * Utilize cryptography, authentication,... You can get there
Whether you're already working and looking to expand your skills in the computer networking and security field or setti... |
|
cena:
436,58 zł |
Professional Pen Testing for Web Applications
ISBN: 9780471789666 / Angielski / Miękka / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be... There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing crea...
|
|
cena:
233,39 zł |
Network Security with Openssl: Cryptography for Secure Communications
ISBN: 9780596002701 / Angielski / Miękka / 386 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it... Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats... |
|
cena:
173,66 zł |
Secure Programming Cookbook for C & C++
ISBN: 9780596003944 / Angielski / Miękka / 792 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks.... |
|
cena:
329,44 zł |
Security Power Tools
ISBN: 9780596009632 / Angielski / Miękka / 860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec... |
|
cena:
260,78 zł |
Information Security: Contemporary Cases: Contemporary Cases
ISBN: 9780763738198 / Angielski / Miękka / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And...
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive C...
|
|
cena:
340,71 zł |
Security in Sensor Networks
ISBN: 9780849370588 / Angielski / Twarda / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
|
|
cena:
626,03 zł |
The Openbsd Pf Packet Filter Book
ISBN: 9780979034206 / Angielski / Miękka / 183 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF FAQ with sections covering Spamd and configuring and using PF on NetBSD, FreeBSD, DragonFly and OpenBSD. The cross-referenced and indexed book also covers quality of service and ALTQ, load balancing, FTP proxying, stateful packet filtering, network address translation (NAT), port forwarding, passive operating system fingerprinting, and redundant firewalls (using pfsync and CARP). The OpenBSD PF Packet Filter Book includes several examples and...
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF ...
|
|
cena:
127,41 zł |
Hacking: The Art of Exploitation, 2nd Edition
ISBN: 9781593271442 / Angielski / Miękka / 488 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope. Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming...
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl...
|
|
cena:
248,30 zł |
How to Cheat at Securing a Wireless Network
ISBN: 9781597490870 / Angielski / Miękka / 453 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006. With this increase in usage comes a commensurate increase in the network's...
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the fav...
|
|
cena:
261,60 zł |
snort intrusion detection and prevention toolkit
ISBN: 9781597490993 / Angielski / Miękka / 730 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features. The book will begin with a discussion of packet inspection and the progression...
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit c...
|
|
cena:
208,62 zł |
Configuring Sonicwall Firewalls
ISBN: 9781597492508 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals....
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in...
|
|
cena:
208,62 zł |
On the Move to Meaningful Internet Systems 2005: Coopis, Doa, and Odbase: Otm Confederated International Conferences, Coopis, Doa, and Odbase 2005, Ag
ISBN: 9783540297383 / Angielski / Miękka / 740 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the three confederated conferences CoopIS 2005, DOA 2005, and ODBASE 2005 held as OTM 2005 in Agia Napa, Cyprus in October/November 2005. This title presents 89 revised and 7 short papers together with 3 keynote speeches that were reviewed and selected from a total of 360 submissions.
Constitutes the refereed proceedings of the three confederated conferences CoopIS 2005, DOA 2005, and ODBASE 2005 held as OTM 2005 in Agia Napa, Cypru...
|
|
cena:
390,87 zł |