![]() |
Hack Proofing ColdFusion
ISBN: 9781928994770 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The only way to stop a hacker is to think like one ColdFusion is a Web application development tool that allows programmers to quickly build robust applications using server-side markup language. It is incredibly popular and has both an established user base and a quickly growing number of new adoptions. It has become the development environment of choice for e-commerce sites and content sites where databases and transactions are the most vulnerable and where security is of the utmost importance. Several security concerns exist for ColdFusion due to its unique approach of designing... The only way to stop a hacker is to think like one ColdFusion is a Web application development tool that allows programmers to quickly buil... |
cena:
280,18 |
![]() |
Developing .Net Web Services With XML
ISBN: 9781928994817 / Angielski / Miękka / 600 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. Developing .Net Web Services with XML introduces readers to the foundation for the .Net platform. The book covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. Readers will be given a thorough introduction to .NET and its XML building blocks while acquiring a firm grasp of how those blocks can be used to... Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater fl... |
cena:
307,60 |
![]() |
Security Sage's Guide to Hardening the Network Infrastructure
ISBN: 9781931836012 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security publishing has boomed in the last several years with a proliferation of materials that focus on various elements of the enterprise. * This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures
* It offers unique coverage of network design so administrators... This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage ...
|
cena:
373,39 |
![]() |
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security
ISBN: 9781931836036 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very...
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urb...
|
cena:
307,60 |
![]() |
Zero-Day Exploit:: Countdown to Darkness
ISBN: 9781931836098 / Angielski / Miękka / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them. * The realistic portrayals of researching, developing, and ultimately...
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every cor...
|
cena:
307,60 |
![]() |
Cyber Adversary Characterization: Auditing the Hacker Mind
ISBN: 9781931836111 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could...
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing c...
|
cena:
307,60 |
![]() |
Aggressive Network Self-Defense
ISBN: 9781931836203 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking,...
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive co...
|
cena:
307,60 |
![]() |
CYA Securing Exchange Server 2003
ISBN: 9781931836241 / Angielski / Miękka / 352 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars throughout, which present valuable cost/benefit analyses of...
A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is org...
|
cena:
252,77 |
![]() |
Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega
ISBN: 9781931836319 / Angielski / Miękka / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base of Ataria and Sega console enthusiasts. This book, written by a team led by Joe Grand, author of "Hardware Hacking: Have Fun While Voiding Your Warranty," provides hard-core gamers with they keys to the kingdom: specific instructions on how to crack into their console and make it do things it was never designed to do. ...The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and t... |
cena:
252,77 |
| |
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
ISBN: 9781931836418 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book...
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers...
|
cena:
252,77 |
![]() |
Cisco Security Specialists Guide to PIX Firewall
ISBN: 9781931836630 / Angielski / Miękka / 608 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device,... Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployme... |
cena:
373,39 |
![]() |
Configuring Symantec AntiVirus Enterprise Edition
ISBN: 9781931836814 / Angielski / Miękka / 800 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's philosophy of "Centralized Antivirus Management." For the same reasons that Symantec bundled together these previously separate products, the book will provide system administrators with a holistic approach to defending their networks from malicious viruses. This book will also serve as a Study Guide for those pursuing Symantec Product Specialist Certifications. Configuring Symantec AntiVirus... This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise... |
cena:
373,39 |
![]() |
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks
ISBN: 9781932266009 / Angielski / Miękka / 400 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, traffic engineering, mpls vpns, mpls vpn deployment models, mpls vpn routing protocol support, multi-protocol bgp, mpls vpn configurations, mpls vpn integration, and mpls vpn management.
Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It...
|
cena:
351,46 |
![]() |
Configuring Netscreen Firewalls
ISBN: 9781932266399 / Angielski / Miękka / 702 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security...
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ...
|
cena:
179,14 |
![]() |
Intrusion Prevention and Active Response: Deploying Network and Host IPS
ISBN: 9781932266474 / Angielski / Miękka / 550 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, session sniping, outright application layer data modification, system call interception, and application shims.
Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on var...
|
cena:
307,60 |
![]() |
Microsoft Log Parser Toolkit: A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
ISBN: 9781932266528 / Angielski / Miękka / 464 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.),... Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and... |
cena:
252,77 |
![]() |
Buffer Overflow Attacks
ISBN: 9781932266672 / Angielski / Miękka / 497 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks. Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the...
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable ...
|
cena:
144,30 |
![]() |
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
ISBN: 9781932266696 / Angielski / Miękka / 656 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. Cisco Security Professional's Guide to Secure Intrusion Detection Systems is a comprehensive, up-to-date guide to the hardware and software that comprise the Cisco IDS. Cisco Security Professional's Guide to Secure Intrusion Detection Systems does more than show network engineers how to set up and manage this line of best selling products... Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads... |
cena:
351,46 |
![]() |
Inside the SPAM Cartel: By Spammer-X
ISBN: 9781932266863 / Angielski / Miękka / 450 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline... Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy.... |
cena:
307,60 |
![]() |
Software Piracy Exposed
ISBN: 9781932266986 / Angielski / Miękka / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book...
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copy...
|
cena:
164,21 |