Mastering Kali Linux for Advanced Penetration Testing
ISBN: 9781782163121 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
296,23 zł |
Jqueryfordesigners: Beginner'sguide
ISBN: 9781783284535 / Angielski / Miękka / 398 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
213,65 zł |
Foundations of Security Analysis and Design VII: Fosad 2012 / 2013 Tutorial Lectures
ISBN: 9783319100814 / Angielski / Miękka / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research.
This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of... FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in compute...
|
|
cena:
183,78 zł |
Threat Forecasting: Leveraging Big Data for Predictive Analysis
ISBN: 9780128000069 / Angielski / Miękka / 188 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to... Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data fo... |
|
cena:
181,49 zł |
Building Virtual Pentesting Labs for Advanced Penetration Testing
ISBN: 9781783284771 / Angielski / Miękka / 430 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
320,50 zł |
Cloud Storage Security: A Practical Guide
ISBN: 9780128029305 / Angielski / Miękka / 144 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and priva...
|
|
cena:
145,18 zł |
The Network Security Test Lab: A Step-By-Step Guide
ISBN: 9781118987056 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ultimate hands-on guide to IT security and proactive defense
The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers... The ultimate hands-on guide to IT security and proactive defense
The Network Security Test Lab is a hands-on, step-by-step guide to u... |
|
cena:
212,94 zł |
Kali Linux Network Scanning Cookbook
ISBN: 9781783982141 / Angielski / Miękka / 452 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
276,79 zł |
Oracle Database 12c Security
ISBN: 9780071824286 / Angielski / Miękka / 552 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c Security provides proven techniques for designing, implementing, and certifying secure Oracle Database systems in a multitenant architecture. The strategies are also applicable to standalone databases. This Oracle Press guide addresses everything from infrastructure to audit lifecycle and describes how to apply security measures in a holistic manner. The latest security features of Oracle Database 12c are explored in detail with practical... Best Practices for Comprehensive Oracle Database Security
Written by renowned experts from Oracle's National Security Group, Oracle Database 12c... |
|
cena:
368,60 zł |
Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance
ISBN: 9781466663244 / Angielski / Twarda / 602 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and...
In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools...
|
|
cena:
2220,51 zł |
Economics of Information Security and Privacy
ISBN: 9781489997227 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law,...
The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and i...
|
|
cena:
765,72 zł |
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
ISBN: 9780071827638 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Exploit and defend against the latest wireless network attacks
Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that... Exploit and defend against the latest wireless network attacks
Learn to exploit weaknesses in wireless network environments using the innovative te... |
|
cena:
316,56 zł |
Hands-on: OpenVPN: Installing and configuring an OpenVPN server and gateway, and setting up OpenVPN clients on Linux and Android
ISBN: 9781503048485 / Angielski / Miękka / 102 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book guides you through the full installation and configuration of an OpenVPN server and gateway on Linux, followed by the set-up of clients on Linux and Android. Working your way through the book, each section provides you with a fully functional set-up. That makes this book ideal for people with general Linux and networking skills, wanting to build an infrastructure facilitating private and secure computing for themselves or their users. Each section provides a quick introduction and overview of the software, followed by a task-driven manual to build a complete set-up. In... This book guides you through the full installation and configuration of an OpenVPN server and gateway on Linux, followed by the set-up of clients o... |
|
cena:
181,90 zł |
Crafting an Information Security Playbook
ISBN: 9781491949405 / Angielski / Miękka / 276 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec... Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demon... |
|
cena:
202,66 zł |
The Architecture of Privacy: On Engineering Technologies That Can Deliver Trustworthy Safeguards
ISBN: 9781491904015 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Technology's influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product functionality, rather than add them late in the development process. Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational... Technology's influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design ... |
|
cena:
130,99 zł |
Trust Management for Service-Oriented Environments
ISBN: 9781489984579 / Angielski / Miękka / 135 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of...
Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care fro...
|
|
cena:
382,84 zł |
Handbook of Information and Communication Security
ISBN: 9783642444593 / Angielski / Miękka / 867 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called "Y2K" issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs)...
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it w...
|
|
cena:
1489,41 zł |
Information Security: Principles and New Concepts (Volume I)
ISBN: 9781632403063 / Angielski / Twarda / 218 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
|
|
cena:
650,25 zł |
Information Security: Principles and New Concepts (Volume II)
ISBN: 9781632403070 / Angielski / Twarda / 222 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
|
|
cena:
650,25 zł |
Information Security: Principles and New Concepts (Volume III)
ISBN: 9781632403087 / Angielski / Twarda / 214 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be secured. Hence, the need for information security has risen in the past few years. This book includes specialised researches on topics related to information security, along with new concepts and theories in this field.
This is the era of information. We can read up about everything on the internet. The data is freely available, thus the important data needs to be sec...
|
|
cena:
650,25 zł |