Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
ISBN: 9781118787311 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop... Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software a... |
|
cena:
229,32 zł |
Access Control, Authentication, and Public Key Infrastructure: Print Bundle
ISBN: 9781284031591 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Access Control Protects Resources Against Unauthorized Viewing, Tampering, Or Destruction. They Serve As A Primary Means Of Ensuring Privacy, Confidentiality, And Prevention Of Unauthorized Disclosure. Revised And Updated With The Latest Data From This Fast Paced Field, Access Control, Authentication, And Public Key Infrastructure Defines The Components Of Access Control, Provides A Business Framework For Implementation, And Discusses Legal...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Acces...
|
|
cena:
613,11 zł |
Mobile Application Security
ISBN: 9780071633567 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this... Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from th... |
|
cena:
264,53 zł |
Security Information and Event Management (SIEM) Implementation
ISBN: 9780071701099 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM... Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this author... |
|
cena:
364,27 zł |
Computer Forensics InfoSec Pro Guide
ISBN: 9780071742450 / Angielski / Miękka / 344 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book. You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from... Security Smarts for the Self-Guided IT Professional
Find out how to excel in the field of computer forensics investigations. Learn what it takes to... |
|
cena:
190,81 zł |
Security Metrics, a Beginner's Guide
ISBN: 9780071744003 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
"An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program " --Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to... Security Smarts for the Self-Guided IT Professional
"An extraordinarily thorough and sophisticated explanation of why you need to measure the effec... |
|
cena:
225,50 zł |
Wireless Network Security a Beginner's Guide
ISBN: 9780071760942 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks,... Security Smarts for the Self-Guided IT Professional
Protect wireless networks against all real-world hacks by learning how hackers operate. Wire... |
|
cena:
182,13 zł |
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap
ISBN: 9780071772518 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across... Master the latest digital security automation technologies Achieve a unified view of security across your IT infrastructure using the cut... |
|
cena:
316,56 zł |
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk
ISBN: 9780071790390 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis.... Uncertainty and risk, meet planning and action. Reinforce your organization's security posture using the expert information contained in ... |
|
cena:
316,56 zł |
Network Security a Beginner's Guide, Third Edition
ISBN: 9780071795708 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption... Security Smarts for the Self-Guided IT Professional
Defend your network against a wide range of existing and emerging threats. Written by a Certifi... |
|
cena:
212,49 zł |
Cisco a Beginner's Guide, Fifth Edition
ISBN: 9780071812313 / Angielski / Miękka / 816 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cisco networking essentials--made easy
Get a solid foundation in Cisco products and technologies from this fully updated bestseller. Covering the latest solutions, Cisco: A Beginner's Guide, Fifth Edition shows you, step-by-step, how to design, build, and manage custom networks. Learn how to configure hardware, use IOS commands, set up wireless networks, and secure your systems. You'll also get tips on preparing for Cisco certification exams. Brand-new voice and social networking features, Cisco TelePresence, the cloud-based Cisco Unified Computing System, and more are fully... Cisco networking essentials--made easy
Get a solid foundation in Cisco products and technologies from this fully updated bestseller. Covering the ... |
|
cena:
294,88 zł |
Introduction to Cyber-Warfare: A Multidisciplinary Approach
ISBN: 9780124078147 / Angielski / Miękka / 318 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world ...
|
|
cena:
191,87 zł |
Emerging Trends in ICT Security
ISBN: 9780124114746 / Angielski / Twarda / 631 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analyt... |
|
cena:
466,83 zł |
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy
ISBN: 9780313360077 / Angielski / Twarda / 160 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and... In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and networ... |
|
cena:
300,30 zł |
Identifying Malicious Code Through Reverse Engineering
ISBN: 9780387098241 / Angielski / Twarda / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world. Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. The malicious patterns are used to develop signatures to prevent vulnerability and block worms or viruses. This book also includes the latest exploits through various case studies. ...Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result... |
|
cena:
382,84 zł |
Fundamentals of Speaker Recognition
ISBN: 9780387775913 / Angielski / Twarda / 942 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Speaker Recognition is an emerging technology which has become quite popular due to its practicality of implementation in an existing telephone infrastructure, and the capability of remote biometric authentication. It is a multidisciplinary subject with information scattered throughout different research publications and textbooks. Speaker Recognition is getting more and more known for providing voice authentication over the telephones for helpdesks, call centers and other enterprise business for business process automation. Technology is evolving to support the consumer end solutions,... Speaker Recognition is an emerging technology which has become quite popular due to its practicality of implementation in an existing telephone inf... |
|
cena:
535,99 zł |
Spyware and Adware
ISBN: 9780387777405 / Angielski / Twarda / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. This book not only brings together current sources of information on spyware and adware but also looks at the future direction of this field. Spyware and Adware is a reference book designed for researchers and professors in computer science, as well as a secondary text for advanced-level students. This book is also suitable for practitioners in industry. Spyware and Adware introduces detailed, organized, technical information exclusively on spyware and adware, including defensive techniques. ... |
|
cena:
382,84 zł |
Network Intrusion Detection and Prevention: Concepts and Techniques
ISBN: 9780387887708 / Angielski / Twarda / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theoretical foundation of attack detection approaches, implementation, data collection, evaluation, and intrusion response. Additionally, it provides an overview of some of the commercially/publicly available intrusion detection and response systems. On the topic of intrusion detection system it is impossible to include everything there is to say on all subjects. However, we have tried to cover the most important and common ones. Network Intrusion... Network Intrusion Detection and Prevention: Concepts and Techniques provides detailed and concise information on different types of attacks, theore... |
|
cena:
574,29 zł |
Computer Security and Penetration Testing
ISBN: 9780840020932 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the fascinating realm of network security. Spotlighting the latest threats and vulnerabilities, this cutting-edge text is packed with real-world examples that showcase today's most important and relevant security topics. It addresses how and why people attack computers and networks--equipping readers with the knowledge and techniques to successfully combat hackers. This edition also includes new...
Delivering up-to-the-minute coverage, COMPUTER SECURITY AND PENETRATION TESTING, Second Edition offers readers of all backgrounds and experience level...
|
|
cena:
562,78 zł |
Elements of Computer Security
ISBN: 9780857290052 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future. Developed from the author's successful Springer guide to Foundations of Computer Security, this accessible textbook/reference is fully updated and enhanced with resources for students and tutors. Topics and features: examines the physical... As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing compute... |
|
cena:
133,82 zł |