Skype Me! From Single User to Small Enterprise and Beyond
ISBN: 9781597490320 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new "Skype Ready" cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype...
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure ...
|
|
cena:
242,77 zł |
How to Cheat at IT Project Management
ISBN: 9781597490375 / Angielski / Miękka / 592 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project management, combining strategic business concepts (project ROI, strategic alignment, etc.) with the very practical, step-by-step instructions for developing and managing a successful IT project. It's short enough to be easily read and used but long enough to be comprehensive in the right...
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complex...
|
|
cena:
309,55 zł |
Perfect Password: Selection, Protection, Authentication
ISBN: 9781597490412 / Angielski / Miękka / 182 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
|
|
cena:
175,99 zł |
Security Log Management: Identifying Patterns in the Chaos
ISBN: 9781597490429 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
|
|
cena:
339,91 zł |
RFID Security
ISBN: 9781597490474 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system...
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas t...
|
|
cena:
339,91 zł |
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
ISBN: 9781597490481 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
|
|
cena:
242,77 zł |
Google Talking
ISBN: 9781597490559 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool. Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet. This book will cover...
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according...
|
|
cena:
242,77 zł |
Syngress Force Emerging Threat Analysis: From Mischief to Malicious
ISBN: 9781597490566 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future.. * From Practical VoIP Security, Thomas Porter, Ph.D. and...
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterp...
|
|
cena:
339,91 zł |
How to Cheat at Configuring ISA Server 2004
ISBN: 9781597490573 / Angielski / Miękka / 616 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be perfect for network designers and security specialists, this is written for the person in the trenches actually running the network day to day. How to Cheat at Configuring ISA Server 2004 is written for the vast majority of Windows System Administrators with too much to do and too little time in which to do it. Unlike books...
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step ...
|
|
cena:
242,77 zł |
How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
ISBN: 9781597490580 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book starts...
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for th...
|
|
cena:
279,20 zł |
Video Conferencing over IP: Configure, Secure, and Troubleshoot
ISBN: 9781597490634 / Angielski / Miękka / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity...
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to depl...
|
|
cena:
339,91 zł |
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat
ISBN: 9781597490641 / Angielski / Miękka / 448 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
|
|
cena:
339,91 zł |
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
ISBN: 9781597490788 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world. This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls....
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world. Thi...
|
|
cena:
412,76 zł |
Winternals Defragmentation, Recovery, and Administration Field Guide
ISBN: 9781597490795 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide. The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. The next chapters introduce the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak which repairs unbootable or locked-out systems, restores lost data, and removes malware from infected machines. Chapters on the Administrator' Pak...
The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide. The book begins with a chapter d...
|
|
cena:
339,91 zł |
Firewall Policies and VPN Configurations
ISBN: 9781597490887 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
|
|
cena:
339,91 zł |
Cryptography for Developers
ISBN: 9781597491044 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...
The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers b...
|
|
cena:
412,76 zł |
Virtualization with Microsoft Virtual Server 2005
ISBN: 9781597491068 / Angielski / Miękka / 481 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how. This book will detail the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort. Furthermore, the book will provide a thorough...
A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physica...
|
|
cena:
339,91 zł |
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
ISBN: 9781597491099 / Angielski / Miękka / 442 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through...
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. ...
|
|
cena:
339,91 zł |
How to Cheat at Managing Information Security
ISBN: 9781597491105 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
|
|
cena:
279,20 zł |
WarDriving and Wireless Penetration Testing
ISBN: 9781597491112 / Angielski / Miękka / 446 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
|
|
cena:
321,69 zł |