The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
ISBN: 9780764569593 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use -social engineering- to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering... Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world... |
|
cena:
181,04 zł |
The Database Hacker's Handbook: Defending Database Servers
ISBN: 9780764578014 / Angielski / Miękka / 532 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling-and relentless.
In this essential follow-up to The Shellcoder's Handbook, four of the world's top security experts teach you to break into and defend the seven most popular database servers. You'll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad... Databases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment his...
|
|
cena:
165,52 zł |
Professional Windows Desktop and Server Hardening
ISBN: 9780764599903 / Angielski / Miękka / 604 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych.
|
|
cena:
164,69 zł |
Information Security: Policy, Processes, and Practices
ISBN: 9780765617187 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The functioning of our business organizations, the management of our supply chains, and the operation of our governments depend on the secure flow of information. In an organizational environment information security is a never-ending process of protecting information and the systems that produce it.This volume in the "Advances in Management Information Systems" series covers the managerial landscape of information security. It deals with how...
Information security is everyone's concern. The way we live is underwritten by information system infrastructures, most notably the Internet. The func...
|
|
cena:
782,54 zł |
Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures
ISBN: 9780792372042 / Angielski / Twarda / 137 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking).
Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital... Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferati...
|
|
cena:
390,87 zł |
E-Commerce Security and Privacy
ISBN: 9780792373995 / Angielski / Twarda / 163 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish the state of the art of and set the course for future research in information security and, two, to serve as a central reference and timely topics in information security research source for advanced and development. The scope of this series includes all aspects of com puter and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thor ough and cohesive overviews of...
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. The goals of this series are, one, to establish t...
|
|
cena:
390,87 zł |
Trusted Recovery and Defensive Information Warfare
ISBN: 9780792375722 / Angielski / Twarda / 133 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research has focused little on the ability to survive successful attacks, which can seriously impair the integrity and availability of a system.
Trusted Recovery And Defensive Information Warfare uses database trusted recovery, as an example, to illustrate the principles of trusted recovery in defensive information warfare. Traditional database recovery mechanisms do not address trusted... Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prev...
|
|
cena:
390,87 zł |
Security of Data and Transaction Processing: A Special Issue of Distributed and Parallel Databases Volume 8, No. 1 (2000)
ISBN: 9780792377610 / Angielski / Twarda / 145 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast moving area.
Security of Data and Transaction Processing serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Security of Data and Transaction Processing brings together in one place important contributions and up-to-date research results in this fast...
|
|
cena:
390,87 zł |
Towards a Quarter-Century of Public Key Cryptography: A Special Issue of Designs, Codes and Cryptography an International Journal. Volume 19, No. 2/3
ISBN: 9780792378020 / Angielski / Twarda / 176 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area.
Towards a Quarter-Century of Public Key Cryptography serves as an excellent reference, providing insight into some of the most challenging research issues in the field. Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in ...
|
|
cena:
390,87 zł |
Research Advances in Database and Information Systems Security: Ifip Tc11 Wg11.3 Thirteenth Working Conference on Database Security July 25-28, 1999,
ISBN: 9780792378488 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society.
Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including:
Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Inter...
|
|
cena:
390,87 zł |
Automated Biometrics: Technologies and Systems
ISBN: 9780792378563 / Angielski / Twarda / 332 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requires that the person to be identified be physically present at the point-of-identification and relies on something which you are or you do' to provide better security, increased efficiency, and improved accuracy. Automated biometrics deals with physiological or behavioral characteristics such as fingerprints, signature, palmprint, iris, hand, voice and face that can be used to authenticate a person's identity or establish an identity from a...
Biometrics-based authentication and identification are emerging as the most reliable method to authenticate and identify individuals. Biometrics requi...
|
|
cena:
586,33 zł |
Information Security for Global Information Infrastructures: Ifip Tc11 Sixteenth Annual Working Conference on Information Security August 22-24, 2000,
ISBN: 9780792379140 / Angielski / Twarda / 514 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is the annual conference of TCll (Information Security) of the International Federation of Information Processing. The conference focuses on the seamless integration of information security services as an integral part of the Global Information Infrastructure in the new millenniUm. SEC2000 is sponsored by the China Computer Federation (CCF), IFIP/TCll, and Engineering Research Centre for Information Security Technology, Chinese Academy of Sciences...
IFIP/SEC2000, being part of the 16th IFIP World Computer Congress (WCC2000), is being held in Beijing, China from August 21 to 25, 2000. SEC2000 is th...
|
|
cena:
781,79 zł |
Database Security XII: Status and Prospects
ISBN: 9780792384885 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society.
Database Security Volume XII covers issues related to security and privacy of information in a wide range of applications, including:
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With...
|
|
cena:
586,33 zł |
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
ISBN: 9780792386759 / Angielski / Mixed media product / 492 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques...
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern c...
|
|
cena:
195,42 zł |
Networking Security and Standards
ISBN: 9780792398905 / Angielski / Twarda / 207 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modification. Putting proper security in place gives us many advantages. It lets us exchange confidential information and keep it confidential. We can be sure that a piece of information received has not been changed. Nobody can deny sending or receiving a piece of information. We can control which piece of information can be accessed, and by whom. We can know when a piece of information was accessed, and by whom. Networks and databases are guarded...
Security is the science and technology of secure communications and resource protection from security violation such as unauthorized access and modifi...
|
|
cena:
586,33 zł |
Anti-Virus Tools and Techniques for Computer
ISBN: 9780815513643 / Angielski / Twarda / 108 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Anti-Virus Tools & Techniques for Computer".
"Anti-Virus Tools & Techniques for Computer".
|
|
cena:
104,29 zł |
Building an Information Security Awareness Program
ISBN: 9780849301162 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step...
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. ...
|
|
cena:
495,56 zł |
Computer Forensics: Evidence Collection and Management
ISBN: 9780849305610 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.
The book is divided into two major parts for easy... Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit ...
|
|
cena:
469,48 zł |
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
ISBN: 9780849308888 / Angielski / Twarda / 896 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
|
|
cena:
626,03 zł |
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
ISBN: 9780849311376 / Angielski / Miękka / 312 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
|
|
cena:
469,48 zł |