Linux Security Cookbook
ISBN: 9780596003913 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of... Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one s... |
|
cena:
174,67 zł |
Mastering FreeBSD and OpenBSD Security
ISBN: 9780596006266 / Angielski / Miękka / 445 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named... FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide sig... |
|
cena:
218,35 zł |
Windows Server Hacks: 100 Industrial-Strength Tips & Tools
ISBN: 9780596006471 / Angielski / Miękka / 357 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script But what about the other ten percent of the time? While it's true that most... One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, cons... |
|
cena:
130,05 zł |
Digital Identity: Unmasking Identity Management Architecture (Ima)
ISBN: 9780596008789 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with... The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. ... |
|
cena:
151,56 zł |
Ssh, the Secure Shell: The Definitive Guide: The Definitive Guide
ISBN: 9780596008956 / Angielski / Miękka / 670 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest... Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption fo... |
|
cena:
195,10 zł |
Network Security Hacks: Tips & Tools for Protecting Your Privacy
ISBN: 9780596527631 / Angielski / Miękka / 480 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security... In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, netw... |
|
cena:
173,42 zł |
Maximum Windows 2000 Security
ISBN: 9780672319655 / Angielski / Miękka / 624 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. Topics include: Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security. To... |
|
cena:
238,47 zł |
Microsoft ISA Server 2000
ISBN: 9780672321009 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple firewall product. By combining enterprise firewall and high-performance Web cache functions, ISA Server provides a common management infrastructure that reduces network complexity and costs. ISA Server protects networks from unauthorized access, inspects traffic, and alerts network administrators to attacks. The readers of this book will receive comprehensive appendices on useful ISA Server information. Readers will find information in this book...
Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple ...
|
|
cena:
195,10 zł |
Open Source E-mail Security
ISBN: 9780672322372 / Angielski / Miękka / 504 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts crucial to stopping spam messages. It presents configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. It also covers advanced security topics.
Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts cruci...
|
|
cena:
173,42 zł |
Managing Projects for Success: A Trilogy
ISBN: 9780727734976 / Angielski / Miękka / 628 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Managing Projects for success is a how to do it book of considerable value to practitioners and students alike. It provides the challenge of theory application through a series of exercises and is comprehensively illustrated. Managing Projects for Success equips the reader with specialist skills that can be immediately applied in practice and is written in three inter-related parts - Part 1: The framework; Part 2: Planning for control and Part 3: The tool kit - to promote clarity of understanding and study.
Managing Projects for success is a how to do it book of considerable value to practitioners and students alike. It provides the challenge of theory ap...
|
|
cena:
636,09 zł |
The Hundredth Window: Protecting Your Privacy and Security in the Age of the Internet
ISBN: 9780743254984 / Angielski / Miękka / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy, whether we like it or not, has gone public. We are only just beginning to recognize how the Internet has redefined the relationship between our private lives and the public sphere. Every time we personalize a Web site, join a mailing list, or purchase a book or CD online, we open our lives to an ever-widening data network that offers us scant protection from the prying eyes of corporations, governments, insurance companies, or criminals. Has the e-commerce revolution permanently eroded all personal boundaries, or is it still possible to protect one's personal information in an...
Privacy, whether we like it or not, has gone public. We are only just beginning to recognize how the Internet has redefined the relationship between o...
|
|
cena:
90,85 zł |
Network Security
ISBN: 9780750650335 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comprehensive review of network security issues with particular relevance to corporate networks from an administrative and user perspective. The book is designed to be particularly suitable for system administrators and users who wish to learn more about the security issues faced by their organization.
With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comp...
|
|
cena:
285,23 zł |
I-Way Robbery: Crime on the Internet
ISBN: 9780750670296 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures. I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset... I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as ... |
|
cena:
619,48 zł |
Surviving in the Security Alarm Business
ISBN: 9780750670982 / Angielski / Miękka / 256 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporate mission statements, paradigm analyses, and corporate reengineering plans. Surviving in the Security Alarm Business will help explain their importance, how to perform them, and what the expected result will be. Teaches alarm professionals how to recreate their business "from scratch" for greater selling success
Illustrates how to do business in the future in response to market changes and trends Suggests techniques for willing... In the very competitive security alarm business, companies are finding themselves more and more burdened with the responsibility of preparing corporat...
|
|
cena:
202,24 zł |
Netspionage: The Global Threat to Information
ISBN: 9780750672573 / Angielski / Miękka / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow...
This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information ...
|
|
cena:
345,98 zł |
Risk Management for Computer Security: Protecting Your Network and Information Assets
ISBN: 9780750677950 / Angielski / Miękka / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer security. It presents an integrated how-to approach to implementing a corporate program, complete with tested methods and processes, flowcharts, and checklists that can be used by the reader and immediately implemented into a computer and overall corporate security program. The challenges are many and this book will... Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessme... |
|
cena:
202,24 zł |
150 Things You Should Know about Security
ISBN: 9780750698337 / Angielski / Miękka / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. 150 Things You Should Know About Security describes current interests, concerns, and needs pertinent to effective security. Several themes have been included, such as management principles and styles, communications, security applications, investigations, technology, physical security, the future, and others. Security and asset practitioners build their professional reputations upon a foundation of measurable achievements in support of a business plan. Specifically, the reduction and prevention of crime, loss, and liability risks are the main issues that influence where and... 150 Things You Should Know About Security describes current interests, concerns, and needs pertinent to effective security. Several themes h... |
|
cena:
394,55 zł |
Security, ID Systems and Locks: The Book on Electronic Access Control
ISBN: 9780750699327 / Angielski / Miękka / 260 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written in clear and simple terms, Security, ID Systems and Locks provides the security professional with a complete understanding of all aspects of electronic access control. Each chapter includes important definitions, helpful study hints, highlighted review, and application questions. Security, ID Systems and Locks will teach you how to:
Throughout the book, the reader will... Written in clear and simple terms, Security, ID Systems and Locks provides the security professional with a complete understanding of all aspects o... |
|
cena:
522,04 zł |
The Art of Deception: Controlling the Human Element of Security
ISBN: 9780764542800 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, -It takes a thief to catch a... The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desp... |
|
cena:
50,67 zł |
Implementing Intrusion Detection Systems
ISBN: 9780764549496 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. * Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with real-world tips and practical techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS * Features coverage of the recently revised IETF IDS specification * Covers IDS standards, managing traffic volume in the IDS, intrusion signatures, log analysis, and incident handling * Provides step-by-step instructions for configuration procedures * Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
* Packed with... |
|
cena:
232,05 zł |