![]() |
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
ISBN: 9781591409113 / Angielski / Twarda / 406 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field how to create secure environments for the application of technology to serve future needs. This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of ...
|
cena:
456,97 zł |
![]() |
Privacy Protection for E-Services
ISBN: 9781591409144 / Angielski / Twarda / 303 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy pre...
|
cena:
482,64 zł |
![]() |
Cyber Warfare and Cyber Terrorism
ISBN: 9781591409915 / Angielski / Twarda / 566 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and...
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologie...
|
cena:
832,25 zł |
![]() |
Hacking The Xbox
ISBN: 9781593270292 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide. Hacking the Xbox... This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essentia... |
cena:
127,73 zł |
![]() |
Implementing the ISO/IEC 27001 Information Security Management System Standard
ISBN: 9781596931725 / Angielski / Twarda / 286 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
|
cena:
434,45 zł |
![]() |
Cisco PIX Firewalls: Configure / Manage / Troubleshoot
ISBN: 9781597490047 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
|
cena:
301,94 zł |
![]() |
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
ISBN: 9781597490054 / Angielski / Miękka / 667 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1....
|
cena:
195,06 zł |
![]() |
Securing IM and P2P Applications for the Enterprise
ISBN: 9781597490177 / Angielski / Miękka / 650 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect...
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many b...
|
cena:
301,94 zł |
![]() |
Host Integrity Monitoring Using Osiris and Samhain
ISBN: 9781597490184 / Angielski / Miękka / 450 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover everything needed to correctly deploy a centralized host integrity monitoring solution. The domain includes home networks on up to large-scale enterprise environments. Throughout the book, realistic and practical configurations will be provided for common server and desktop platforms. By the end of the book, the reader will not...
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and...
|
cena:
275,04 zł |
![]() |
Skype Me! From Single User to Small Enterprise and Beyond
ISBN: 9781597490320 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new "Skype Ready" cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype...
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure ...
|
cena:
215,86 zł |
![]() |
How to Cheat at IT Project Management
ISBN: 9781597490375 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It's short enough to be easily read and used but long enough to be comprehensive in the right...
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complex...
|
cena:
275,04 zł |
![]() |
Perfect Password: Selection, Protection, Authentication
ISBN: 9781597490412 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
|
cena:
156,68 zł |
![]() |
Security Log Management: Identifying Patterns in the Chaos
ISBN: 9781597490429 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
|
cena:
301,94 zł |
![]() |
RFID Security
ISBN: 9781597490474 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system...
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
|
cena:
301,94 zł |
![]() |
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
ISBN: 9781597490481 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
|
cena:
215,86 zł |
![]() |
Google Talking
ISBN: 9781597490559 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet. This book will cover...
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according...
|
cena:
215,86 zł |
![]() |
Syngress Force Emerging Threat Analysis: From Mischief to Malicious
ISBN: 9781597490566 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and...
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterp...
|
cena:
301,94 zł |
![]() |
How to Cheat at Configuring ISA Server 2004
ISBN: 9781597490573 / Angielski / Miękka / 616 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books...
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step ...
|
cena:
215,86 zł |
![]() |
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
ISBN: 9781597490580 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts...
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for th...
|
cena:
248,14 zł |
![]() |
Video Conferencing over IP: Configure, Secure, and Troubleshoot
ISBN: 9781597490634 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity...
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to depl...
|
cena:
301,94 zł |