![]() |
Invitation to Cryptology
ISBN: 9780130889768 / Angielski / Twarda / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new and old are organized around a historical framework. A variety of mathematical topics that are germane to cryptology (e.g., modular arithmetic, Boolean functions, complexity theory, etc.) are developed, but they do not overshadow the main focus of the book. Chapter topics cover origins, examples, and ideas in cryptology; classical cryptographic techniques; symmetric computer-based cryptology; public-key cryptography; and present practice,... This book introduces a wide range of up-to-date cryptological concepts along with the mathematical ideas that are behind them. The new an... |
cena:
948,99 |
![]() |
Wireless Network Security
ISBN: 9780387280400 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireles... |
cena:
608,07 |
![]() |
Botnet Detection: Countering the Largest Security Threat
ISBN: 9780387687667 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help ... |
cena:
405,36 |
![]() |
Critical Information Infrastructures: Resilience and Protection
ISBN: 9780387718613 / Angielski / Twarda / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would...
Resilience is an increasingly important concept and quality in today s world. It is particularly important in the area of Critical Infrastructures. It...
|
cena:
405,36 |
![]() |
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the Ifip Tc 11 22nd International Information Security Conferen
ISBN: 9780387723662 / Angielski / Twarda / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Security, Privacy and Trust in Complex Environments" held in Sandton, South Africa from 14 to 16 May 2007. The IFIP/SEC conferences are the flagship events of TC-11. In May 1995 South Africa for the first time hosted an IFIP/SEC conference in Cape Town. Now, twelve years later, we are very pleased to have succeeded in our bid to once again present the IFIP/SEC conference in South Africa. The current IT environment deals with novel, complex approaches...
This book contains the Proceedings of the 22nd IFIP TC-11 International Information Security Conference (IFIP/SEC 2007) on "New Approaches for Securit...
|
cena:
405,36 |
![]() |
Security for Telecommunications Networks
ISBN: 9780387724416 / Angielski / Twarda / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in... This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunicati... |
cena:
486,44 |
![]() |
Fifth World Conference on Information Security Education: Proceedings of the Ifip Tc 11 Wg 11.8, Wise 5, 19 to 21 June 2007, United States Military Ac
ISBN: 9780387732688 / Angielski / Twarda / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings... International Federation for Information Processing (The IFIP) series publishes state-of-the-art results in the sciences and technologies of inform... |
cena:
202,66 |
![]() |
Vulnerability Analysis and Defense for the Internet
ISBN: 9780387743899 / Angielski / Twarda / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting attacks, SQL injection attacks, format string attacks, buffer overflows, DNS amplification attacks etc. Although these attacks are not new and are well known, the number of vulnerabilities disclosed to the public jumped nearly 5 percent during the first six months of 2007. This accounts to be the fourth year report, which shows the raise in...
Vulnerability Analysis is a process that defines, identifies, and classifies the vulnerabilities in a computer network or an application. Vulnerabilit...
|
cena:
405,36 |
![]() |
Network Security Fundamentals
ISBN: 9780470101926 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You can get there
Whether you're already working and looking to expand your skills in the computer networking and security field or setting out on a new career path, Network Security Fundamentals will help you get there. Easy-to-read, practical, and up-to-date, this text not only helps you learn network security techniques at your own pace; it helps you master the core competencies and skills you need to succeed. With this book, you will be able to: * Understand basic terminology and concepts related to security * Utilize cryptography, authentication,... You can get there
Whether you're already working and looking to expand your skills in the computer networking and security field or setti... |
cena:
459,88 |
![]() |
Professional Pen Testing for Web Applications
ISBN: 9780471789666 / Angielski / Miękka / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.
After a review of the basics of web applications, you'll be... There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing crea...
|
cena:
213,68 |
![]() |
Network Security with Openssl: Cryptography for Secure Communications
ISBN: 9780596002701 / Angielski / Miękka / 386 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it... Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats... |
cena:
155,21 |
![]() |
Secure Programming Cookbook for C & C++
ISBN: 9780596003944 / Angielski / Miękka / 792 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks.... |
cena:
296,80 |
![]() |
Security Power Tools
ISBN: 9780596009632 / Angielski / Miękka / 860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec... |
cena:
233,06 |
![]() |
Internet Security: Hacking, Counterhacking, and Society: Hacking, Counterhacking, and Society
ISBN: 9780763735364 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Frequency Of Digital Attacks And Intrusions Has Steadily Increased Over The Years As The Number Of People With The Appropriate Motivation And Technical Ability Continues To Grow. Internet Security: Hacking, Counterhacking, And Society Is A Modern Survey Of The Recent Ethical Policy Issues Arising In Connection With Internet And Network Security. This Exciting Collection Of Papers, Articles, And Monographs Discusses A Number Of Important Ethical Questions Arising In Many Distinct Areas Of Internet And Network Security, Including: Are Hacker Attacks And Hacktivism Morally Justified? Is...
The Frequency Of Digital Attacks And Intrusions Has Steadily Increased Over The Years As The Number Of People With The Appropriate Motivation And Tech...
|
cena:
608,56 |
![]() |
Information Security: Contemporary Cases: Contemporary Cases
ISBN: 9780763738198 / Angielski / Miękka / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And...
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive C...
|
cena:
305,17 |
![]() |
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
ISBN: 9780849308888 / Angielski / Twarda / 896 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
|
cena:
667,93 |
![]() |
Securing Windows Nt/2000: From Policies to Firewalls
ISBN: 9780849312618 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The... In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
|
cena:
519,50 |
![]() |
The Ethical Hack: A Framework for Business Value Penetration Testing
ISBN: 9780849316098 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
|
cena:
667,93 |
![]() |
Network Perimeter Security: Building Defense In-Depth
ISBN: 9780849316289 / Angielski / Twarda / 420 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
|
cena:
667,93 |
![]() |
Surviving Security: How to Integrate People, Process, and Technology
ISBN: 9780849320422 / Angielski / Twarda / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be taken to protect information assets. Surviving Security: How to Integrate People, Process, and Technology, Second Edition fills this void by explaining security through a holistic approach that considers both the overall security infrastructure and the roles of each individual component. This book provides a blueprint for creating and executing sound security policy. The author examines the costs and complications involved, covering security...
Previous information security references do not address the gulf between general security awareness and the specific technical steps that need to be t...
|
cena:
667,93 |