![]() |
Theory and Practice of Cryptography Solutions for Secure Information Systems
ISBN: 9781466640306 / Angielski / Twarda / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of...
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business...
|
cena:
999,40 |
![]() |
Computer Networks: 20th International Conference, Cn 2013, Lwowek Slaski, Poland, June 17-21, 2013. Proceedings
ISBN: 9783642388644 / Angielski / Miękka / 594 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in June 2013. The 58 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers in these proceedings cover the following topics: computer networks, network architectural issues, Internet and wireless solutions, teleinformatics and communications, new technologies, queueing theory and queueing networks, innovative applications, networking in e-business, security aspects of hardware and software,...
This book constitutes the refereed proceedings of the 20th International Conference on Computer Networks, CN 2013, held in Lwowek Slaski, Poland, in J...
|
cena:
201,24 |
![]() |
Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems
ISBN: 9788792982735 / Angielski / Twarda / 364 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today, we see the integration of Industrial, Business, and Consumer Internet. This integration is bringing together the Internet of People, Internet of Things, Internet of Energy, Internet of Vehicles, and Internet of Media, Services, and Enterprises. In this way, it forms the backbone of the digital economy and digital society and the foundation for the future knowledge and innovation-based economy in supporting solutions for the emerging challenges of public health, aging population, environmental protection and climate change, the conservation of energy and scarce materials, enhancements...
Today, we see the integration of Industrial, Business, and Consumer Internet. This integration is bringing together the Internet of People, Internet o...
|
cena:
587,73 |
![]() |
Securing the Clicks: Network Security in the Age of Social Media
ISBN: 9780071769051 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive... Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction f... |
cena:
154,14 |
![]() |
Reverse Deception: Organized Cyber Threat Counter-Exploitation
ISBN: 9780071772495 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and... In-depth counterintelligence tactics to fight cyber-espionage "A comprehensive and unparalleled overview of the topic by experts in t... |
cena:
200,38 |
![]() |
Web Application Security
ISBN: 9780071776165 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc. Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious... Security Smarts for the Self-Guided IT Professional
"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess... |
cena:
200,38 |
![]() |
Hacking Exposed 7
ISBN: 9780071780285 / Angielski / Miękka / 768 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the... The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s... |
cena:
235,06 |
![]() |
Malware, Rootkits & Botnets
ISBN: 9780071792066 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for... Security Smarts for the Self-Guided IT Professional
Learn how to improve the security posture of your organization and defend against some of the m... |
cena:
200,38 |
![]() |
Incident Response & Computer Forensics, Third Edition
ISBN: 9780071798686 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The definitive guide to incident response--updated for the first time in a decade
Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks. ...The definitive guide to incident response--updated for the first time in a decade
Thoroughly revised to cover the latest and most effective tools ... |
cena:
251,57 |
![]() |
Anti-Hacker Tool Kit, Fourth Edition
ISBN: 9780071800143 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to... Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,... |
cena:
211,94 |
![]() |
Computer Forensics and Digital Investigation with EnCase Forensic v7
ISBN: 9780071807913 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic v7 reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute of Standards and Technology CFReDS. Customizable sample... Conduct repeatable, defensible investigations with EnCase Forensic v7
Maximize the powerful tools and features of the industry-leading digital inve... |
cena:
235,06 |
![]() |
Hacking Exposed Mobile: Security Secrets & Solutions
ISBN: 9780071817011 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior... Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The autho... |
cena:
235,06 |
![]() |
Practical Anonymity: Hiding in Plain Sight Online
ISBN: 9780124104044 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be... For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activis... |
cena:
102,81 |
![]() |
Protecting Industrial Control Systems from Electronic Threat
ISBN: 9781606501979 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Suitable for both the novice and expert in IT security and industrial control systems (ICS), this book helps readers gain a better understanding of protecting ICSs from electronic threats. It features include: how to better understand the convergence between Industrial Control Systems (ICS) and general IT systems; and more.
Suitable for both the novice and expert in IT security and industrial control systems (ICS), this book helps readers gain a better understanding of pr...
|
cena:
445,69 |
![]() |
Backtrack - Testing Wireless Network Security
ISBN: 9781782164067 / Angielski / Miękka / 108 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In the majority of cases, the default settings for your networks are not enough to protect you. With your data being transferred over the air, it can be easily plucked and used by anyone who knows how. Don't let it happen to you. BackTrack - Testing Wireless Network Security will help you secure your wireless networks and keep your personal data safe. With this book, you will learn how to configure your hardware for optimum security, find network...
Wireless networks are everywhere. You have probably set one up yourself, but have you ever wondered just how safe you are while browsing online? In th...
|
cena:
142,38 |
![]() |
Microsoft System Center 2012 Endpoint Protection Cookbook
ISBN: 9781849683906 / Angielski / Miękka / 208 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems against threats with leading malware detection technologies. Built on Configuration Manager, it provides a unified infrastructure for client security and compliance management and "Microsoft System Center 2012 Endpoint Protection Cookbook" will help you get to grips with vital tasks for implementing this security tool. With the release of System Center 2012 Endpoint Protection, Microsoft is continuing its commitment to offering a cutting edge,...
Microsoft System Center 2012 Endpoint Protection (previously known as Forefront Endpoint Protection 2012) protects client and server operating systems...
|
cena:
211,44 |
![]() |
Microsoft Forefront Identity Manager 2010 R2 Handbook
ISBN: 9781849685368 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastructure of an enterprise with strong authentication systems. The "Microsoft Forefront Identity Manager 2010 R2 Handbook" is an in-depth guide to Identity Management. You will learn how to manage users and groups and implement self-service parts. This book also covers basic Certificate Management and troubleshooting. Throughout the book we will follow a fictional case study. You will see how to implement IM and also set up Smart Card logon for...
Microsoft's Forefront Identity Manager simplifies enterprise identity management for end users by automating admin tasks and integrating the infrastru...
|
cena:
263,22 |
![]() |
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
ISBN: 9781466646919 / Angielski / Twarda / 577 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current... While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
|
cena:
999,40 |
![]() |
Selinux Policy Administration
ISBN: 9781783283170 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security measure. SELinux System Administration covers the majority of SELinux features through a mix of real-life scenarios, descriptions, and examples. Everything an administrator needs to further tune SELinux to suit their needs are present in this book. This book...
NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access ...
|
cena:
159,64 |
![]() |
Journal of Cyber Security and Mobility 1-2/3
ISBN: 9788792982117 / Angielski / Miękka / 154 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
222,10 |