![]() |
Penetration Testing
ISBN: 9781593275648 / Angielski / Miękka / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security exper... |
cena:
192,63 |
![]() |
Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ISBN: 9783642452031 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India...
|
cena:
201,24 |
![]() |
Information and Network Security Management: Strategic Concept Applications
ISBN: 9781491236338 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
|
cena:
453,17 |
![]() |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 32 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
cena:
80,88 |
![]() |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
56,61 |
![]() |
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
ISBN: 9780071823074 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion... Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve ... |
cena:
281,31 |
![]() |
The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value
ISBN: 9781430263555 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled... "It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy a...
|
cena:
181,11 |
![]() |
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham,
ISBN: 9783642545672 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the...
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Wo...
|
cena:
201,24 |
![]() |
Guide to Securing Legacy IEEE 802.11 Wireless Networks
ISBN: 9781495990243 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. Details on securing WLANs capable of IEEE 802.11i can be found in NIST Special Publication (SP) 800-97. Recommendations for securely using external WLANs, such as public wireless access points, are outside the scope of this document.
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that can...
|
cena:
40,02 |
![]() |
Using the BACnet Communications DLL v1.0
ISBN: 9781495990519 / Angielski / Miękka / 32 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
|
cena:
64,70 |
![]() |
Network Attacks and Exploitation: A Framework
ISBN: 9781118987124 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and... Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, com... |
cena:
185,60 |
![]() |
Building the Infrastructure for Cloud Security: A Solutions View
ISBN: 9781430261452 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity... For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. T...
|
cena:
152,93 |
![]() |
Legal Issues In Information Security
ISBN: 9781284054743 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Part Of The Jones & Bartlett Learning Information Systems Security And Assurance Series Http: //Www.Issaseries.Com Revised And Updated To Address The Many Changes In This Evolving Field, The Second Edition Of Legal Issues In Information Security (Textbook With Lab Manual) Addresses The Area Where Law And Information Security Concerns Intersect. Information Systems Security And Legal Compliance Are Now Required To Protect Critical Governmental And Corporate Infrastructure, Intellectual Property Created By Individuals And Organizations Alike, And Information That Individuals Believe Should Be...
Part Of The Jones & Bartlett Learning Information Systems Security And Assurance Series Http: //Www.Issaseries.Com Revised And Updated To Address The ...
|
cena:
406,51 |
![]() |
Cyberwarfare: Information Operations in a Connected World
ISBN: 9781284058482 / Angielski / Miękka / 428 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Part Of The Jones & Bartlett Learning Information Systems Security & Assurance Series Cyberwarfare Puts Students On The Real-World Battlefield Of Cyberspace Students Will Learn The History Of Cyberwarfare, Techniques Used In Both Offensive And Defensive Information Warfare, And How Cyberwarfare Is Shaping Military Doctrine. Written By Subject Matter Experts, This Book Combines Accessible Explanations With Realistic Experiences And Case Studies That Make Cyberwar Evident And Understandable. Key Features: - Incorporates Hands-On Activities, Relevant Examples, And Realistic Exercises To Prepare...
Part Of The Jones & Bartlett Learning Information Systems Security & Assurance Series Cyberwarfare Puts Students On The Real-World Battlefield Of Cybe...
|
cena:
406,51 |
![]() |
Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure
ISBN: 9781849519489 / Angielski / Miękka / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
211,44 |
![]() |
Gitolite Essentials
ISBN: 9781783282371 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
142,38 |
![]() |
Multidisciplinary Perspectives in Cryptology and Information Security
ISBN: 9781466658080 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions--
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offeri...
|
cena:
1255,66 |
![]() |
Lab Manual to Accompany Auditing It Infrastructure for Compliance
ISBN: 9781284059182 / Angielski / Miękka / 90 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Laboratory Manual To Accompany Auditing IT Infrastructure For Compliance Is The Lab Companion To Weiss' Auditing IT Infrastructure For Compliance. It Provides Hands-On Exercises, Each With Measurable Learning Outcomes. About The Series Visit Www.Issaseries.Com For A Complete Look At The Series The Jones & Bartlett Learning Information System & Assurance Series Delivers Fundamental IT Security Principles Packed With Real-World Applications And Examples For IT Security, Cybersecurity, Information Assurance, And Information Systems Security Programs. Authored By Certified Information...
The Laboratory Manual To Accompany Auditing IT Infrastructure For Compliance Is The Lab Companion To Weiss' Auditing IT Infrastructure For Compliance....
|
cena:
161,63 |
![]() |
Mastering Metasploit
ISBN: 9781782162223 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
237,33 |
![]() |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
ISBN: 9781118918210 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware... Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security t... |
cena:
211,94 |