Vmware View Security Essentials
ISBN: 9781782170082 / Angielski / Miękka / 130 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered security Secure all your connections between client and desktop
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered ...
|
|
cena:
213,65 zł |
Penetration Testing
ISBN: 9781593275648 / Angielski / Miękka / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security exper... |
|
cena:
243,20 zł |
Information Systems Security: 9th International Conference, ICISS 2013, Kolkata, India, December 16-20, 2013. Proceedings
ISBN: 9783642452031 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical problems in information and systems security and related areas.
This book constitutes the refereed proceedings of the 9th International Conference on Information Systems Security, ICISS 2013, held in Kolkata, India...
|
|
cena:
191,40 zł |
Information and Network Security Management: Strategic Concept Applications
ISBN: 9781491236338 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
|
|
cena:
509,97 zł |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 32 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
|
cena:
91,02 zł |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 50 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
63,70 zł |
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
ISBN: 9780071823074 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve your organization's security posture using the proven defense strategies in this thoroughly updated guide. Hacking Exposed(TM) Malware and Rootkits: Security Secrets & Solutions, Second Edition fully explains the hacker's latest methods alongside ready-to-deploy countermeasures. Discover how to block pop-up and phishing exploits, terminate embedded code, and identify and eliminate rootkits. You will get up-to-date coverage of intrusion... Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve ... |
|
cena:
316,56 zł |
The Privacy Engineer's Manifesto: Getting from Policy to Code to Qa to Value
ISBN: 9781430263555 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled... "It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy a...
|
|
cena:
172,26 zł |
Data Privacy Management and Autonomous Spontaneous Security: 8th International Workshop, Dpm 2013, and 6th International Workshop, Setop 2013, Egham,
ISBN: 9783642545672 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the...
This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Wo...
|
|
cena:
191,40 zł |
Guide to Securing Legacy IEEE 802.11 Wireless Networks
ISBN: 9781495990243 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. Details on securing WLANs capable of IEEE 802.11i can be found in NIST Special Publication (SP) 800-97. Recommendations for securely using external WLANs, such as public wireless access points, are outside the scope of this document.
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that can...
|
|
cena:
45,03 zł |
Using the BACnet Communications DLL v1.0
ISBN: 9781495990519 / Angielski / Miękka / 32 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
|
|
cena:
72,81 zł |
Network Attacks and Exploitation: A Framework
ISBN: 9781118987124 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and... Incorporate offense and defense for a more effective network security strategy
Network Attacks and Exploitation provides a clear, com... |
|
cena:
196,56 zł |
Building the Infrastructure for Cloud Security: A Solutions View
ISBN: 9781430261452 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here also is an explanation of the security and compliance challenges organizations face as they migrate mission-critical
applications to the cloud, and how trusted clouds, that have their integrity... For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. T...
|
|
cena:
145,46 zł |
Kali Linux - Assuring Security by Penetration Testing: With Kali Linux you can test the vulnerabilities of your network and then take steps to secure
ISBN: 9781849519489 / Angielski / Miękka / 454 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
237,94 zł |
Gitolite Essentials
ISBN: 9781783282371 / Angielski / Miękka / 120 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
160,23 zł |
Multidisciplinary Perspectives in Cryptology and Information Security
ISBN: 9781466658080 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encryption solutions--
This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offeri...
|
|
cena:
1413,05 zł |
Mastering Metasploit
ISBN: 9781782162223 / Angielski / Miękka / 378 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
267,08 zł |
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
ISBN: 9781118918210 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware... Master Wireshark to solve real-world security problems If you don't already use Wireshark for a wide range of information security t... |
|
cena:
232,05 zł |
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security
ISBN: 9780124201255 / Angielski / Miękka / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years the CSA has been at the forefront of research and analysis into the most pressing security and privacy related issues associated with cloud computing. CSA Guide to Cloud Computing provides you with a one-stop source for industry-leading content, as well as a roadmap into the future considerations that the cloud presents. The authors of CSA... CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques ... |
|
cena:
243,74 zł |
Designing and Building Security Operations Center
ISBN: 9780128008997 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will... Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence ... |
|
cena:
191,87 zł |