Mechanics of User Identification and Authentication: Fundamentals of Identity Management
ISBN: 9781420052190 / Angielski / Twarda / 760 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth yet accessible manner.
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting ...
|
|
cena:
622,44 zł |
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
ISBN: 9781420052855 / Angielski / Twarda / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this book presents case studies and tools for monitoring specific items, and offers practical guidance for implementing metrics across an entire organization.
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this b...
|
|
cena:
414,91 zł |
Building an Effective Information Security Policy Architecture
ISBN: 9781420059052 / Angielski / Twarda / 368 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise.
A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book... Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant ...
|
|
cena:
674,31 zł |
Multimedia Content Encryption: Techniques and Applications
ISBN: 9781420065275 / Angielski / Twarda / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field. The book begins with the history of multimedia encryption and then examines general performance... The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no l... |
|
cena:
596,51 zł |
Encyclopedia of Information Assurance - 4 Volume Set (Print)
ISBN: 9781420066203 / Angielski / Twarda / 3860 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) p...
|
|
cena:
6224,40 zł |
Information Security Management Handbook, Volume 2
ISBN: 9781420067088 / Angielski / Twarda / 456 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT...
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth ...
|
|
cena:
622,44 zł |
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet
ISBN: 9781420069037 / Angielski / Twarda / 168 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats ...
|
|
cena:
363,04 zł |
Algorithmic Cryptanalysis
ISBN: 9781420070026 / Angielski / Twarda / 501 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard-Fourier-Walsh transforms, lattice reduction, and Grobner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He includes some hints and solutions to... Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples... |
|
cena:
674,31 zł |
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications
ISBN: 9781420848243 / Angielski / Twarda / 341 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," opera...
|
|
cena:
257,97 zł |
Computer Security and Telerobotics for Everyone
ISBN: 9781420896824 / Angielski / Miękka / 179 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
100,58 zł |
Firewalls: Jumpstart for Network and Systems Administrators
ISBN: 9781555582975 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
|
|
cena:
305,98 zł |
Wireless Operational Security
ISBN: 9781555583170 / Angielski / Miękka / 468 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired...
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless...
|
|
cena:
607,04 zł |
Microsoft Windows Security Fundamentals
ISBN: 9781555583408 / Angielski / Miękka / 803 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves...
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 ...
|
|
cena:
600,97 zł |
Java Cryptography
ISBN: 9781565924024 / Angielski / Miękka / 364 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java... Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides t... |
|
cena:
196,51 zł |
Information Hiding Techniques for Steganography and Digital Watermarking
ISBN: 9781580530354 / Angielski / Twarda / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.
This book is the first comprehensive survey of steganography and watermarking and their application to modern communications and multimedia.
|
|
cena:
619,25 zł |
Fundamentals of Network Security
ISBN: 9781580531764 / Angielski / Twarda / 340 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professionals to fundamental network security concepts, principles, and terms, while providing practical techniques that can be applied on the job. It helps identify the best type of intrusion detection system for a particular environment, develop organizational guidelines for passwords, set general computer security policies, and perform a security review and risk assessment.
Network security has quickly become an area of primary concern in the world of telecommunications. This easy-to-understand book introduces professiona...
|
|
cena:
536,69 zł |
A Practical Guide to Managing Information Security
ISBN: 9781580537025 / Angielski / Twarda / 284 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This guidebook helps professionals to master the management of information security, concentrating on the proactive development and implementation of IT security for the enterprise.
This guidebook helps professionals to master the management of information security, concentrating on the proactive development and implementation of ...
|
|
cena:
526,37 zł |
Security in Wireless LANs and Mans
ISBN: 9781580537551 / Angielski / Twarda / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues.
With the popularity of the wireless LAN standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN)...
|
|
cena:
393,12 zł |
Codes: The Guide to Secrecy from Ancient to Modern Times
ISBN: 9781584884705 / Angielski / Twarda / 679 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day practice. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. It is designed such that the non-professional reader may...
This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day p...
|
|
cena:
907,73 zł |
Expert Web Services Security in the .Net Platform
ISBN: 9781590591154 / Angielski / Miękka / 280 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to secure Web services on the .NET platform. This book specifically focuses on Web services security, not general .NET security. Authors Brian Nantz and Laurence Moroney lay the foundation for a complete discussion of Web services security in the .NET platform by first describing... Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features w... |
|
cena:
172,26 zł |