![]() |
Open Source Software for Digital Forensics
ISBN: 9781489983282 / Angielski / Miękka / 124 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents the motivations for using FLOSS applications as tools for collection, preservation and analysis of digital evidence in computer and network forensics. It also covers extensively several forensic FLOSS tools, their origins and evolution. Open Source Software for Digital Forensics is based on the OSSCoNF workshop, which was held in Milan, Italy, September 2008 at the World Computing Congress, co-located with OSS 2008. This edited... Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics.... |
cena:
603,81 |
![]() |
Cyber-Physical System Design with Sensor Networking Technologies
ISBN: 9781849198240 / Angielski / Twarda / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first book in this new area and it uniquely focuses on sensor networks in cyber-physical systems. It has been peer-reviewed by experts in the areas of sensor networks and cyber-physical systems. Furthermore, the book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems--acquiring data, pushing data from the physical system to the cyber system, and routing decisions to appliances.
Cyber-Physical System Design with Sensor Networking Technologies is essential... This is the first book in this new area and it uniquely focuses on sensor networks in cyber-physical systems. It has been peer-reviewed by experts in ...
|
cena:
486,97 |
![]() |
Code of Practice for Cyber Security in the Built Environment
ISBN: 9781849198912 / Angielski / Miękka / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing on building-related systems and all connections to the wider cyber environment. It provides clear practical guidance to help multidisciplinary teams understand how the management of key aspects of cyber security relate to their specific jobs and responsibilities in maintaining the security of a building. It is intended to act as an integral part of an organization's overall management system ensuring the cyber security of building related...
This code of practice explains why and how cyber security should be considered throughout a building's lifecycle and explains good practice, focusing ...
|
cena:
456,29 |
![]() |
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
ISBN: 9780128018675 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment--that is, reconnaissance--is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data. Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a... Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abu... |
cena:
213,70 |
![]() |
MPLS in the SDN Era
ISBN: 9781491905456 / Angielski / Miękka / 920 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of multivendor Multiprotocol Label Switching (MPLS) services on networks, down to the configuration level. You'll learn where Juniper Network's Junos, Cisco's IOS XR, and OpenContrail, interoperate and where they don't. Two network and cloud professionals from Juniper describe how MPLS technologies and applications have rapidly evolved through services and architectures such as Ethernet VPNs, Network Function Virtualization, Seamless MPLS,... How can you make multivendor services work smoothly on today's complex networks? This practical book shows you how to deploy a large portfolio of m... |
cena:
286,30 |
![]() |
Threats, Countermeasures, and Advances in Applied Information Security
ISBN: 9781466609785 / Angielski / Twarda / 548 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow exponentially. Threats, Countermeasures, and Advances in Applied Information Security addresses the fact that managing information security program while effectively managing risks has never been so critical. This book contains 24 chapters on the most relevant and important issues and advances in applied information security management. The chapters are authored by leading researchers and practitioners in the field of information security from...
Organizations are increasingly relying on electronic information to conduct business, which has caused the amount of personal information to grow expo...
|
cena:
985,79 |
![]() |
Essential Cybersecurity Science
ISBN: 9781491920947 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You'll learn how to conduct scientific experiments on everyday tools and procedures, whether you're evaluating corporate security systems, testing your own security product, or looking for bugs in a mobile game. Once author Josiah Dykstra gets you up to speed on the scientific method, he helps you focus on standalone, domain-specific topics,... If you're involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to... |
cena:
204,49 |
![]() |
Wireshark Network Security
ISBN: 9781784393335 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
187,27 |
![]() |
Introduction to Evolutionary Informatics
ISBN: 9789813142145 / Angielski / Miękka / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the information ubiquitous in nature.Introduction to Evolutionary Informatics fuses results from complexity modeling and information theory that allow both meaning and design difficulty in nature to be measured in bits. Built on the foundation of a series of peer-reviewed papers published by the authors, the book is written at a level easily understandable to readers with knowledge of rudimentary high school math. Those seeking a quick first read or...
Science has made great strides in modeling space, time, mass and energy. Yet little attention has been paid to the precise representation of the infor...
|
cena:
233,17 |
![]() |
Hacking University: Freshman Edition: Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beg
ISBN: 9781535445023 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you?
This book contains demonstrations of hacking techniques and actual code. Aspiring hackers can follow along to get a feel for how professions operate, and persons wishing to hide... Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you? |
cena:
51,84 |
![]() |
Computer Science and Technology: Proceedings of the International Conference (CST2016)
ISBN: 9789813146419 / Angielski / Twarda / 1288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This proceedings consists of selected papers presented at the International Conference on Computer Science and Technology (CST2016), which was successfully held in Shenzhen, China during January 8-10, 2016.CST2016 covered a wide range of fundamental studies, technical innovations and industrial applications in 7 areas, namely Computer Systems, Computer Network, Security, Databases and Information Systems, Artificial Intelligence and Multimedia, Theory and Software Engineering and Computer Applications.CST 2016 aims to provide a forum for researchers, engineers, and students in the area of...
This proceedings consists of selected papers presented at the International Conference on Computer Science and Technology (CST2016), which was success...
|
cena:
1991,71 |
![]() |
Foundations of Security Analysis and Design VIII: Fosad 2014/2015/2016 Tutorial Lectures
ISBN: 9783319430041 / Angielski / Miękka / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in comp... |
cena:
169,08 |
![]() |
Ransomware: Defending Against Digital Extortion
ISBN: 9781491967881 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for... The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay... |
cena:
152,00 |
![]() |
Computer Science, Technology and Application - Proceedings of the 2016 International Conference on Computer Science, Technology and Application (Csta2
ISBN: 9789813200432 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) were held in Changsha, China on March 18-20, 2016. The main objective of the joint conference is to provide a platform for researchers, academics and industrial professionals to present their research findings in the fields of computer science and technology.The CSTA2016 received more than 150 submissions, but only 67 articles were selected to be included in this proceedings, which are organized into 6 chapters; covering Image and Signal Processing, Computer Network, Algorithm and Simulation, Data...
The 2016 International Conference on Computer Science, Technology and Application (CSTA2016) were held in Changsha, China on March 18-20, 2016. The ma...
|
cena:
1161,02 |
![]() |
Attacking Network Protocols
ISBN: 9781593277505 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities. Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro,...
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehens...
|
cena:
271,70 |
![]() |
How to Disappear From The Internet Completely While Leaving False Trails: How to Be Anonymous Online
ISBN: 9781539618768 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online Why do some people want to erase themselves completely from the internet? I used to wonder about the same till I found the reason and had to do it myself. I am sure if you are reading this book, you too have a reason, but going through this process, I have learned a few valuable lessons. This book is all about those lessons, so you don't have to learn on the go as I had to. Instead, you can use this book as a guide and just follow the step... How to Disappear From The Internet Completely While Leaving False Trails How to Be Anonymous Online<... |
cena:
58,07 |
![]() |
Docker Networking Cookbook
ISBN: 9781786461148 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Book Enhance your Docker networking skills and protect your organization using advanced networking functions Learn how to use third party tools to extend Docker networking This practical and recipe-based book demonstrates the different ways in which you can network containers leveraging the Docker engine. Who This Book Is For The book is for system administrators as well as developers who are well versed with the concepts of Docker and have basic...
60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Boo...
|
cena:
234,10 |
![]() |
Troubleshooting OpenVPN
ISBN: 9781786461964 / Angielski / Miękka / 178 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
165,98 |
![]() |
Metasploit Bootcamp
ISBN: 9781788297134 / Angielski / Miękka / 230 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
208,56 |
![]() |
Metasploit for Beginners: Create a threat-free environment with the best-in-class tool
ISBN: 9781788295970 / Angielski / Miękka / 190 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, this book carries out penetration testing in highly-secured environments with Metasploit. It helps you learn to bypass different defenses to gain access into different systems.
Covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics, ...
|
cena:
165,98 |