The Official Chfi Study Guide (Exam 312-49): For Computer Hacking Forensic Investigator
ISBN: 9781597491976 / Angielski / Miękka / 939 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The EC-Council offers certification for ethical hacking and computer forensics. Their ethical hacker exam has become very popular as an industry gauge and we expect the forensics exam to follow suit. Material is presented in a logical learning sequence: a section builds upon previous sections and a chapter on previous...
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professiona...
|
|
cena:
412,76 zł |
Practical Oracle Security: Your Unauthorized Guide to Relational Database Security
ISBN: 9781597491983 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database.
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to asses...
|
|
cena:
339,91 zł |
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
ISBN: 9781597492003 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest se...
|
|
cena:
412,76 zł |
Web Application Vulnerabilities: Detect, Exploit, Prevent
ISBN: 9781597492096 / Angielski / Miękka / 460 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. ...
|
|
cena:
241,20 zł |
The Best Damn Firewall Book Period
ISBN: 9781597492188 / Angielski / Miękka / 1123 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this volume is an indispensable addition to a serious networking professionals toolkit. Coverage includes migrating to ISA Server 2006, integrating Windows Firewall and Vista security into your enterprise, successfully integrating Voice over IP applications around...
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Micr...
|
|
cena:
228,18 zł |
Techno Security's Guide to E-Discovery and Digital Forensics
ISBN: 9781597492232 / Angielski / Miękka / 405 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and pr...
|
|
cena:
412,76 zł |
Infosecurity 2008 Threat Analysis
ISBN: 9781597492249 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards...
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, c...
|
|
cena:
212,61 zł |
The Best Damn IT Security Management Book Period
ISBN: 9781597492270 / Angielski / Miękka / 914 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload. Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration. Compiled from the...
The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of manage...
|
|
cena:
412,76 zł |
How to Cheat at Deploying and Securing RFID
ISBN: 9781597492300 / Angielski / Miękka / 343 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities...
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
|
|
cena:
197,05 zł |
Writing Security Tools and Exploits
ISBN: 9781597499972 / Angielski / Miękka / 638 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques...
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational refere...
|
|
cena:
197,05 zł |
Advances in Enterprise Information Technology Security
ISBN: 9781599040905 / Angielski / Twarda / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined.
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterpris...
|
|
cena:
951,65 zł |
Integrating Security and Software Engineering: Advances and Future Vision
ISBN: 9781599041476 / Angielski / Twarda Termin realizacji zamówienia: ok. 5-8 dni roboczych. Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. Integrating Security and Software Engineering: Advances and Future Visions discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and soft...
|
|
cena:
547,63 zł |
Web Services Security and E-Business
ISBN: 9781599041681 / Angielski / Twarda / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems.Web Services Security and E-Business provides insight into uncovering the security...
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access contro...
|
|
cena:
547,63 zł |
Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks
ISBN: 9781599045139 / Angielski / Twarda / 346 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Digital audio watermarking has been proposed as a new and alternative method to enforce intellectual property rights and protect digital audio from tampering. Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks is a comprehensive compilation of the major theoretical frameworks, research findings, and practical applications. With inclusive coverage of the most authoritative research in the area, Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks will serve as a vital reference to researchers and practitioners in a variety of...
Digital audio watermarking has been proposed as a new and alternative method to enforce intellectual property rights and protect digital audio from ta...
|
|
cena:
1038,16 zł |
Cryptography and Security Services: Mechanisms and Applications
ISBN: 9781599048376 / Angielski / Twarda / 490 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
|
|
cena:
576,47 zł |
The Cryptogic Password Protocol
ISBN: 9781844012510 / Angielski / Miękka / 52 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome the simple approaches used by the public to manage their passwords and PINs. Imagine if: - You could have different and sophisticated passwords and PINs for each service. - There were no limits to the number of different passwords/PINs you could manage in your mind without having to memorise them. -...
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...?...
|
|
cena:
63,09 zł |
Security Modeling and Analysis of Mobile Agent Systems
ISBN: 9781860946349 / Angielski / Twarda / 212 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure...
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse a...
|
|
cena:
508,33 zł |
Troubleshooting Windows 2000 TCP/IP
ISBN: 9781928994114 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP...
TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are buil...
|
|
cena:
339,91 zł |
Hack Proofing Sun Solaris 8
ISBN: 9781928994442 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only way to stop a hacker is to think like one Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing... The only way to stop a hacker is to think like one Sun Microsystem's venerable and well-respected operating system Solaris is currently in ... |
|
cena:
412,76 zł |
.NET Mobile Web Developers Guide
ISBN: 9781928994565 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications. This book assumes the readers have... Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to develop... |
|
cena:
339,91 zł |