![]() |
Computer Security: 20 Things Every Employee Should Know
ISBN: 9780072262827 / Angielski / Miękka / 64 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to keep corporate data and systems secure. This guide includes Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; and E-mail.
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to ke...
|
cena:
94,27 |
![]() |
Cyber Attacks: Protecting National Infrastructure
ISBN: 9780123849175 / Angielski / Twarda / 233 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US... Cyber Attacks takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction. It initiates an int... |
cena:
219,40 |
![]() |
Embedded Systems Security: Practical Methods for Safe and Secure Software and Systems Development
ISBN: 9780123868862 / Angielski / Miękka / 396 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides:
The ultimate resource for making embedded systems reliable, safe, and secure Embedded Systems Security provides:
|
cena:
239,35 |
![]() |
Cyber Attacks: Protecting National Infrastructure
ISBN: 9780123918550 / Angielski / Twarda / 319 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. In this edition, each principle is presented as a separate security... Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national i... |
cena:
254,31 |
![]() |
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
ISBN: 9780124047372 / Angielski / Miękka / 150 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks... The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book ex... |
cena:
119,65 |
![]() |
Fisma Compliance Handbook: Second Edition
ISBN: 9780124058712 / Angielski / Miękka / 350 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a... This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition ... |
cena:
274,26 |
![]() |
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard
ISBN: 9780124095045 / Angielski / Miękka / 32 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they... Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. |
cena:
115,98 |
![]() |
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
ISBN: 9780124095052 / Angielski / Miękka / 48 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find... Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Key... |
cena:
115,98 |
![]() |
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard
ISBN: 9780124095069 / Angielski / Miękka / 28 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate... Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.... |
cena:
115,98 |
![]() |
Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensic Fiel
ISBN: 9780124095076 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to...
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in ...
|
cena:
69,77 |
![]() |
Business Continuity and Disaster Recovery Planning for IT Professionals
ISBN: 9780124105263 / Angielski / Miękka / 620 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks,... Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses... |
cena:
390,87 |
![]() |
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
ISBN: 9780124116443 / Angielski / Miękka / 225 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and... The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration te... |
cena:
119,65 |
![]() |
Handbook on Securing Cyber-Physical Critical Infrastructure
ISBN: 9780124158153 / Angielski / Twarda / 848 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels),... The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructu... |
cena:
344,09 |
![]() |
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
ISBN: 9780124166721 / Angielski / Miękka / 306 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to... Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, batt... |
cena:
149,57 |
![]() |
Network and System Security
ISBN: 9780124166899 / Angielski / Miękka / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. ...Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide... |
cena:
234,36 |
![]() |
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)
ISBN: 9780321812575 / Angielski / Twarda / 389 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT(R) Guide to Insider Threats describes CERT's findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The...
Since 2001, the CERT(R) Insider Threat Center at Carnegie Mellon University's Software Engineering Institute (SEI) has collected and analyzed informat...
|
cena:
299,04 |
![]() |
Computer Forensics for Dummies
ISBN: 9780470371916 / Angielski / Miękka / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes,... Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies Professional and ...
|
cena:
125,62 |
![]() |
Network Security Bible
ISBN: 9780470502495 / Angielski / Miękka / 936 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the reference you need at your side. Covering new techniques, technology, and methods for approaching security, it also examines new trends and best practices being used by many organizations. The revised Network Security Bible complements the Cisco Academy course instruction in networking security.
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensiv... |
cena:
235,58 |
![]() |
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code [With DVD]
ISBN: 9780470613030 / Angielski / Twarda / 752 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. A computer forensics "how-to" for fighting malicious code and analyzing incidents
With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.
A computer forensics "how-to" for fighting malicious code and analyzing incidents
With our ever-increasing reliance on computers comes an ev... |
cena:
249,38 |
![]() |
Unauthorised Access: Physical Penetration Testing For IT Security Teams
ISBN: 9780470747612 / Angielski / Miękka / 308 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any... The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on kee... |
cena:
157,50 |