BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
ISBN: 9781597491129 / Angielski / Miękka / 291 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms. Bignum math is the backbone of modern computer security algorithms. It is the ability to work with hundred-digit numbers efficiently using techniques that are both elegant and occasionally bizarre. This book introduces the reader to the concept of bignum...
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide suppor...
|
|
cena:
327,77 zł |
Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
ISBN: 9781597491143 / Angielski / Miękka / 279 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page views per month and a weekly newsletter with 25,000 subscribers, Tony has learned how to talk to people, everyday people, about computer security. Intended for the security illiterate, Essential Computer Security...
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand th...
|
|
cena:
212,42 zł |
Dictionary of Information Security
ISBN: 9781597491150 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification candidates for security specializations like CISSP and Security] will also find this a...
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will fin...
|
|
cena:
121,89 zł |
Fisma Certification and Accreditation Handbook
ISBN: 9781597491167 / Angielski / Miękka / 498 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will be cited and discussed including the three leading types of C&A: NIST, NIAP, and DITSCAP. Next, the book explains how to prepare for, perform, and document a C&A project. The next section to the book illustrates addressing security awareness, end-user rules of behavior, and incident response...
The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what...
|
|
cena:
455,26 zł |
Kismet Hacking
ISBN: 9781597491174 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book...
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthus...
|
|
cena:
217,80 zł |
Configuring Juniper Networks Netscreen and Ssg Firewalls
ISBN: 9781597491181 / Angielski / Miękka / 743 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest se...
|
|
cena:
191,87 zł |
Physical and Logical Security Convergence: Powered by Enterprise Security Management
ISBN: 9781597491228 / Angielski / Miękka / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic. This book begins with an overall explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in today's changing security landscape. It then details enterprise security management as it relates to incident detection and incident management. This is followed by detailed examples of implementation, taking the reader...
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but ther...
|
|
cena:
412,76 zł |
Secure Your Network for Free
ISBN: 9781597491235 / Angielski / Miękka / 493 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn't want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available...
This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book fo...
|
|
cena:
279,20 zł |
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
ISBN: 9781597491297 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level. Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
|
|
cena:
339,91 zł |
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
ISBN: 9781597491334 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only...
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The bo...
|
|
cena:
228,18 zł |
Botnets: The Killer Web Applications
ISBN: 9781597491358 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
|
|
cena:
339,91 zł |
XSS Attacks: Cross Site Scripting Exploits and Defense
ISBN: 9781597491549 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
|
|
cena:
412,76 zł |
Alternate Data Storage Forensics
ISBN: 9781597491631 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of... Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
|
|
cena:
412,76 zł |
AVIEN Malware Defense Guide for the Enterprise
ISBN: 9781597491648 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about...
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on ...
|
|
cena:
412,76 zł |
Linksys WRT54G Ultimate Hacking
ISBN: 9781597491662 / Angielski / Miękka / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models...
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a n...
|
|
cena:
150,37 zł |
Zen and the Art of Information Security
ISBN: 9781597491686 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security underst...
|
|
cena:
212,42 zł |
How to Cheat at VoIP Security
ISBN: 9781597491693 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different.... The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect in... |
|
cena:
339,91 zł |
How to Cheat at Configuring Open Source Security Tools
ISBN: 9781597491709 / Angielski / Miękka / 528 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that... The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perf... |
|
cena:
339,91 zł |
SonicWALL Secure Wireless Networks Integrated Solutions Guide
ISBN: 9781597491938 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure, leaving users and private data at risk. Many wireless proprietors think that the convenience of wireless outweighs the possible risk of insecure impelentation, or that secure wireless is far too complicated to worry about deploying. SonicWALL(R) Secure Wireless Networks Integrated Solutions Guide provides a systematic approach to creating secure wireless networks, using the Plan, Design,...
Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless ...
|
|
cena:
412,76 zł |
How to Cheat at Securing SQL Server 2005
ISBN: 9781597491969 / Angielski / Miękka / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to Cheat promises help in order to get SQL Server secured as quickly and safely as possible.
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product fo...
|
|
cena:
339,91 zł |