Lab Manual for Security+ Guide to Network Security Fundamentals
ISBN: 9781111640132 / Angielski / Miękka / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 4th Edition includes 70 hands-on labs that map directly to CompTIA's 2011 Security+ Certification exam objectives. Each lab presents identifiable learning objectives, references to specific exam objectives, a required materials list, and estimated completion times to help instructors accurately plan activities. The labs also provide clear, step-by-step instructions and review questions to reinforce hands-on learning.
Lab Manual for Ciampa's Security+ Guide to Network Security Fundamentals, 4th Edition includes 70 hands-on labs that map directly to CompTIA's 2011 Se...
|
|
cena:
234,73 zł |
Guide to Network Security, International Edition
ISBN: 9781133279075 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions.
This wide-ranging text provides a detailed review of the network security field, including essential terminology, the history of the discipline, and p...
|
|
cena:
343,93 zł |
Database Security
ISBN: 9781435453906 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network security daily. DATABASE SECURITY delivers the know-how and skills IT Professionals must have to protect technology infrastructures, intellectual property, and the company's prosperity. From database installation and testing to auditing and SQL Injection, DATABASE this text delves into the essential processes and protocols that prevent intrusions, while reinforcing each topic with eye-opening, real-world examples. Unlike most texts on database security, which take a...
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network security daily. DATABASE SEC...
|
|
cena:
267,49 zł |
The Lure : The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals
ISBN: 9781435457126 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that can be used by IT professionals, business managers and academics who wish to learn how to protect systems from abuse, and who wish to respond to network incidents.
A case study of a large, complex and highly technical persecution of two Russian hackers. The materials presented offer a wealth of information that c...
|
|
cena:
174,67 zł |
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System: Escape and Evasion in the Dark Corners of the System
ISBN: 9781449626365 / Angielski / Miękka / 784 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It Possible To Maintain A Covert Operational Foothold For Extended Periods, Even In A High-Security Environment. Adopting An Approach That Favors Full Disclosure, The Updated Second Edition Of The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Forensic Countermeasures. This Book Covers More Topics, In Greater Depth, Than Any Other Currently Available. In Doing So The Author Forges Through The Murky Back Alleys Of The...
While Forensic Analysis Has Proven To Be A Valuable Investigative Tool In The Field Of Computer Security, Utilizing Anti-Forensic Technology Makes It ...
|
|
cena:
661,68 zł |
The Practice of Network Security Monitoring
ISBN: 9781593275099 / Angielski / Miękka / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy,...
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most ...
|
|
cena:
273,61 zł |
Nessus Network Auditing
ISBN: 9781597492089 / Angielski / Miękka / 433 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community. * Perform a Vulnerability Assessment Use... The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its begin... |
|
cena:
243,74 zł |
Fisma and the Risk Management Framework: The New Practice of Federal Cyber Security
ISBN: 9781597496414 / Angielski / Miękka / 562 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies.
Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information... FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA)...
|
|
cena:
285,23 zł |
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
ISBN: 9781597499576 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to... Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead... |
|
cena:
202,66 zł |
Robust Control System Networks: How to Achieve Reliable Control After Stuxnet
ISBN: 9781606503003 / Angielski / Twarda / 222 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust." Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward...
From the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," comes a book that takes...
|
|
cena:
433,65 zł |
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide
ISBN: 9781849517744 / Angielski / Miękka / 414 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and not all of them with good intentions. The need for penetration testers has grown now that the security industryhas had time to mature. Simply running a vulnerability scanner is a thing of the past and is no longer an effective method of determining a business s true security posture. Learn effective penetration testing skills so that you can effectively meet and manage the rapidly changing security needs of your company. Advanced Penetration...
The internet security field has grown by leaps and bounds over the last decade. Everyday more people around the globe gain access to the internet and ...
|
|
cena:
320,50 zł |
Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide
ISBN: 9781893939943 / Angielski / Miękka / 986 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast - no more finger pointing because the packets never lie From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark. Learn to customize Wireshark for faster and more accurate analysis of your network traffic. Build graphs to identify and expose issues such as packet loss, receiver congestion, slow server response, network queuing...
Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...
|
|
cena:
613,11 zł |
Information and Communications Security: 15th International Conference, Icics 2013, Beijing, China, November 20-22, 2013, Proceedings
ISBN: 9783319027258 / Angielski / Miękka / 414 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Beijing, China, in November 2013. The 23 regular papers and 6 short papers were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on system security, Web security and worm detection, cloud storage security, virtualization for cloud computing, trusted and trustworthy computing, authentication and security protocols, intrusion detection and recovery, side channel attacks and defense, engineering...
This book constitutes the refereed proceedings of the 15th International Conference on Information and Communications Security, ICICS 2013, held in Be...
|
|
cena:
191,40 zł |
Kali Linux Cookbook
ISBN: 9781783289592 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. This book outlines a variety of popular tools of penetration testing, and thus serves as a source of information for the security professional and novice alike.
Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular ...
|
|
cena:
223,37 zł |
Economic Espionage and Trade Secret Theft: Are Our Laws Adequate for Today's Threats?
ISBN: 9781532792007 / Angielski / Miękka / 112 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
81,73 zł |
Nine Steps to Success: An ISO 27001 Implementation Overview
ISBN: 9781849288231 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Aligned with the latest iteration of the Standard ISO 27001:2013 this new edition of the original no-nonsense guide to successful ISO 27001 certification is ideal for anyone tackling ISO 27001 for the first time, and covers each element of the ISO 27001 project in simple, non-technical language "Aligned with the latest iteration of the Standard ISO 27001:2013 this new edition of the original no-nonsense guide to successful ISO 27001 certifi... |
|
cena:
182,09 zł |
Open Problems in Network Security: Ifip Wg 11.4 International Workshop, Inetsec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers
ISBN: 9783319390277 / Angielski / Miękka / 127 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Security, iNetSec 2015, held in Zurich, Switzerland, in October 2015. iNetSec is the main workshop of the IFIP working group WG 11.4; its objective is to present and discuss open problems and new research directions on all aspects related to network security. This book constitutes the thoroughly refereed post-conference proceedings of the IFIP WG 11.4 International Workshop on Open Problems in Network Se... |
|
cena:
191,40 zł |
Architectures and Protocols for Secure Information Technology Infrastructures
ISBN: 9781466645141 / Angielski / Twarda / 427 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making th...
|
|
cena:
1124,68 zł |
Network Security Technologies: Design and Applications
ISBN: 9781466647893 / Angielski / Twarda / 330 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologie...
|
|
cena:
1124,68 zł |
Analyzing Security, Trust, and Crime in the Digital World
ISBN: 9781466648562 / Angielski / Twarda / 281 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizatio...
|
|
cena:
1124,68 zł |