Intrusion Prevention and Active Response: Deploying Network and Host IPS
ISBN: 9781932266474 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on var...
|
|
cena:
339,91 zł |
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
ISBN: 9781932266528 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.),... Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and... |
|
cena:
279,20 zł |
Hacking the Code: ASP.Net Web Application Security
ISBN: 9781932266658 / Angielski / Twarda / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing... Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security... |
|
cena:
339,91 zł |
Buffer Overflow Attacks
ISBN: 9781932266672 / Angielski / Miękka / 497 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks. Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the...
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable ...
|
|
cena:
150,37 zł |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
ISBN: 9781932266696 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products... Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads... |
|
cena:
388,48 zł |
Black Hat Physical Device Security: Exploiting Hardware and Software
ISBN: 9781932266818 / Angielski / Twarda / 363 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts show readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. The Black Hat Briefings held every year in Las Vegas, Washington DC, Amsterdam, and Singapore continually expose the greatest threats to cyber security and... Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exp... |
|
cena:
339,91 zł |
Inside the SPAM Cartel: By Spammer-X
ISBN: 9781932266863 / Angielski / Miękka / 450 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline... Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy.... |
|
cena:
339,91 zł |
Check Point Next Generation with Application Intelligence Security Administration
ISBN: 9781932266894 / Angielski / Miękka / 600 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features....
Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security profess...
|
|
cena:
412,76 zł |
Managing and Securing a Cisco Structured Wireless-Aware Network
ISBN: 9781932266917 / Angielski / Twarda / 469 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, Managing and Securing a Cisco Structured Wireless-Aware Network also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco...
Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consu...
|
|
cena:
388,48 zł |
Security Assessment: Case Studies for Implementing the Nsa Iam
ISBN: 9781932266962 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. Security Assessment shows how to do a complete security assessment based on the NSA's guidelines. Security Assessment also focuses on providing a detailed organizational information technology security assessment using... The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled wi... |
|
cena:
473,47 zł |
Software Piracy Exposed
ISBN: 9781932266986 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book...
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copy...
|
|
cena:
171,12 zł |
Secure Systems Development with UML
ISBN: 9783540007012 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jurjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to... Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is diffi... |
|
cena:
382,84 zł |
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection: 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings
ISBN: 9783540201854 / Angielski / Miękka / 268 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in Torino, Italy in October 2003.The 21 revised full papers presented were carefully reviewed and selected for presentation. The papers are organized in topical sections on cryptography, network security, mobile and wireless network security, trust and privacy, application security, and multimedia security.
This book constitutes the refereed proceedings of the 7th IFIP International Conference on Communications and Multimedia Security, CMS 2003, held in T...
|
|
cena:
191,40 zł |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, Isi 2004, Tucson, Az, Usa, June 10-11, 2004, Proceed
ISBN: 9783540221258 / Angielski / Miękka / 544 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies, orga- zational studies, and security-related public policy. Like medical and biological research, which is facing signi?cant information overload and yet also trem- dous opportunities for new innovation, the communities of law enforcement, criminal analysis, and intelligence are facing the same challenge. As medical - formatics and bioinformatics have become major ?elds of study, the science of intelligence and security informatics is now...
The past two years have seen signi?cant interest and progress made in national and homeland security research in the areas of information technologies...
|
|
cena:
382,84 zł |
Foundations of Security Analysis and Design III: FOSAD 2004/2005 Tutorial Lectures
ISBN: 9783540289555 / Angielski / Miękka / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The "Int- national School on Foundations of Security Analysis and Design" (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate...
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing numb...
|
|
cena:
172,11 zł |
Trustworthy Global Computing: International Symposium, Tgc 2005, Edinburgh, Uk, April 7-9, 2005. Revised Selected Papers
ISBN: 9783540300076 / Angielski / Miękka / 371 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, and more.
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, such as resource usage, lang...
|
|
cena:
191,40 zł |
Electronic Government: 5th International Conference, EGOV 2006, Krakow, Poland, September 4-8, 2006, Proceedings
ISBN: 9783540376866 / Angielski / Miękka / 374 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in conjunction with DEXA 2006. The book offers 31 revised papers depicting the state of the art in e-government/ e-governance, arranged in topical sections on research, review and outlook, participation and democracy, designing government services, legal dimensions in e-government, procurement and governance issues in networked governments, and more. This book presents the refereed proceedings of the 5th International Conference on Electronic Government, EGOV 2006, held in in Krakow, Poland in c... |
|
cena:
191,40 zł |
Quantum Computing and Quantum Communications: First NASA International Conference, QCQC '98, Palm Springs, California, USA, February 17-20, 1998, Selected Papers
ISBN: 9783540655145 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communications, QCQC'98, held in Palm Springs, California, USA in February 1998. As the record of the large-scale meeting entirely devoted to quantum computing and communication, this book is a survey of developments in the area. The 43 carefully reviewed papers are organized in topical sections on entanglement and quantum algorithms, quantum cryptography, quantum copying and quantum information theory, quantum error correction and fault-tolerant quantum...
This text constitutes the strictly refereed post-proceedings of the First NASA International Conference on Quantum Computing and Quantum Communication...
|
|
cena:
191,40 zł |
Information Security and Cryptology - ICISC'99: Second International Conference Seoul, Korea, December 9-10, 1999 Proceedings
ISBN: 9783540673804 / Angielski / Miękka / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KIISC). It took place at Korea University, Seoul, Korea, December 9-10, 1999. Jong In Lee of Korea University was responsible for the organization. The call for papers brought 61 papers from 10 countries on four continents. As in the last year the review process was totally blind. The informationabout - thors or their a?liationwas not given to Technical Program Committee (TPC) members. Each TPC member was random-coded and did not even know who...
The 2nd International Conference on Information Security and Cryptology (ICISC)wassponsored bythe KoreaInstituteofInformationSecurityandCr- tology(KII...
|
|
cena:
191,40 zł |
Theory of Cryptography: 4th Theory of Cryptography Conference, Tcc 2007, Amsterdam, the Netherlands, February 21-24, 2007, Proceedings
ISBN: 9783540709350 / Angielski / Miękka / 612 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment. This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in Februa... |
|
cena:
382,84 zł |