Wi-Fi Security
ISBN: 9780071410731 / Angielski / Miękka / 309 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real ones, and arming investors with the facts they need to make informed decisions. This guide to understanding options includes such new material as references to online sites relevant to options investors; information on how to pick brokerage firms; detailed explanations of risk; bailout points; how to pick stocks for options investing; and how put options can enhance portfolio returns. This fifth edition also contains examples, updated charts, and...
In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real on...
|
|
cena:
265,60 zł |
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
ISBN: 9780071494618 / Angielski / Miękka / 258 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and... Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.... |
|
cena:
276,19 zł |
Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios
ISBN: 9780072193848 / Angielski / Miękka / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the... "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, secu...
|
|
cena:
159,67 zł |
XML Security
ISBN: 9780072193992 / Angielski / Miękka / 379 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
|
|
cena:
315,03 zł |
McOmmerce Security: A Beginner's Guide
ISBN: 9780072194609 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies,... Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to inc... |
|
cena:
211,46 zł |
Biometrics
ISBN: 9780072222272 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something you do (signature) and something you are (fingerprint).
This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something ...
|
|
cena:
263,25 zł |
Wireless Security
ISBN: 9780072222869 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a security system to protect your wireless network and keep hackers out.
Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a...
|
|
cena:
263,25 zł |
Check Point VPN-1/Fire Wall-1 NG Administration
ISBN: 9780072223422 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. This work includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.
Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Th...
|
|
cena:
263,25 zł |
Windows XP Professional Security
ISBN: 9780072226027 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows XP Professional.
Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows X...
|
|
cena:
263,25 zł |
Hardening Linux
ISBN: 9780072254976 / Angielski / Miękka / 404 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.
Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the firs...
|
|
cena:
211,46 zł |
Hardening Network Infrastructure
ISBN: 9780072255027 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Shows network administrators and IT pros how to harden their network infrastructure against hackers.
Shows network administrators and IT pros how to harden their network infrastructure against hackers.
|
|
cena:
211,46 zł |
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 9780072259179 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed method...
|
|
cena:
306,40 zł |
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
ISBN: 9780072263046 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP,... The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security ... |
|
cena:
306,40 zł |
Enterprise Directory and Security Implementation Guide: Designing and Implementing Directories in Your Organization
ISBN: 9780121604523 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that...
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, ...
|
|
cena:
281,13 zł |
Hacking: Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security: (How to Hack, Compute
ISBN: 9781517245399 / Angielski / Miękka / 26 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacking Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security
This hacking guidebook is your travelling bag of tricks with step-by-step tutorials on different ethical hacking techniques. The book lends you a hacker's mindset, while equipping you with hacker "under system" tricks to help you thwart hack attacks. It exposes a number of easy-to-follow hacking secrets and other fundamental concepts all under one cover. It's a powerful source of information for those who are just starting off as ethical hackers or defensive coders. If you... Hacking Full Hacking Guide for Beginners With 30 Useful Tips. All You Need To Know About Basic Security
This hacking guidebook is you... |
|
cena:
40,55 zł |
Optical and Digital Techniques for Information Security
ISBN: 9780387206165 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system--even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these...
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspec...
|
|
cena:
387,30 zł |
Neuroimmunology of Sleep
ISBN: 9780387691442 / Angielski / Twarda / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. During the last few decades, Sleep Medicine and Science, and many of their diverse aspects, have emerged as areas of intense medical and scientific interest. Of these, Sleep and Neuroimmunology are highly interlinked and inherently fascinating which cut across many behavioral states, touches all facets of human health and wellbeing. Elucidating the roles of immune substances and cells in Central Nervous System functions and their critical relationships in immune mechanisms in health and diseases across behavioral states. As one of the first of its kind, this Neuroimmunology of... During the last few decades, Sleep Medicine and Science, and many of their diverse aspects, have emerged as areas of intense medical and scientific... |
|
cena:
697,18 zł |
Communications and Multimedia Security
ISBN: 9780412732607 / Angielski / Twarda / 224 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertext documents to specialized cryptographic algorithms. It provides the interested reader with a spectrum of up-to-the-minute knowledge on the topics covered.
This volume covers many aspects of multimedia and communications security, from national security policies to file server architectures, from hypertex...
|
|
cena:
580,98 zł |
Communications and Multimedia Security: Volume 3
ISBN: 9780412817700 / Angielski / Twarda / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd Joint Working Conference of IFIP TC6 and TC11, arranged by the International Federation for Information Processing and held in Athens, Greece in September 1997. The book aims to cover the subject of Communications and Multimedia Systems Security, as fully as possible. It constitutes an essential reading for information technology security specialists; computer professionals; communication systems professionals; EDP managers; EDP auditors;...
This book presents a state-of-the art review of current perspectives on Communications and Multimedia Security. It contains the Proceedings of the 3rd...
|
|
cena:
580,98 zł |
Information Security in Research and Business: Proceedings of the Ifip Tc11 13th International Conference on Information Security (SEC '97): 14-16 May
ISBN: 9780412817809 / Angielski / Twarda / 472 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recently, IT has entered all important areas of society. Enterprises, individuals and civilisations all depend on functioning, safe and secure IT. Focus on IT security has previously been fractionalised, detailed and often linked to non-business applicaitons. The aim of this book is to address the current and future prospects of modern IT security, functionality in business, trade, industry, health care and government. The main topic areas covered include existing IT security tools and methodology for modern IT environments, laws, regulations and ethics in IT security environments, current...
Recently, IT has entered all important areas of society. Enterprises, individuals and civilisations all depend on functioning, safe and secure IT. Foc...
|
|
cena:
774,65 zł |