Handbook of Research on Information Security and Assurance
ISBN: 9781599048550 / Angielski / Twarda / 586 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
|
|
cena:
1528,40 zł |
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
ISBN: 9780596514839 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ... |
|
cena:
173,42 zł |
Cybercrime: Secure It or Lose It
ISBN: 9780595481705 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information ...
|
|
cena:
77,84 zł |
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
ISBN: 9783836464963 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
|
|
cena:
257,03 zł |
Computer Security - Esorics 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
ISBN: 9783540586180 / Angielski / Twarda / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
Th... |
|
cena:
191,40 zł |
Handbook of Security and Networks
ISBN: 9789814273039 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
|
|
cena:
944,03 zł |
Cyberpower and National Security
ISBN: 9781597974233 / Angielski / Miękka / 664 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by... The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The ...
|
|
cena:
160,80 zł |
Dnssec Specifications
ISBN: 9780979034275 / Angielski / Miękka / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
|
|
cena:
109,50 zł |
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives
ISBN: 9781615209019 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under...
In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquit...
|
|
cena:
1038,16 zł |
Spam 2 Scam How 2 B E-Safe
ISBN: 9781440424618 / Angielski / Miękka / 134 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight forward language to suit every reader irrespective of his/her background. Plenty of information is already available on 'what' ranging from advisories to blogs to actual, published works. There are commercial products offering varying degrees of security too. However, the efficacy of those solutions depends on the 'awareness' of the user concerned, because you have to take the call ultimately on what is a real deal and what is a potentially fraudulent product or service. This...
This is a book about SPAM, e-SCAMs and how to be safe from them. Here is a book written in a simple style and straight forward language to suit every ...
|
|
cena:
113,61 zł |
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption
ISBN: 9781615207374 / Angielski / Twarda / 598 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study. "
"Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed s...
|
|
cena:
1038,16 zł |
Internet Security For Parents: Discover The Hidden Dangers That You And Your Children Face Online
ISBN: 9781438244716 / Angielski / Miękka / 106 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book will show parents the hidden dangers online that pose a great threat to both their kids and the parents themselves. Inside this book you will learn why most kids are at risk to online predators, why parents are at risk to identity theft, the one activity kids do online that is costing parents thousands of dollars in lawsuits, and many more hidden dangers that no one has ever revealed to parents who have kids using the Internet. This book is written with the busy parent in mind that doesn't understand much about the computer except how to turn one on and use the Internet. If you have...
This book will show parents the hidden dangers online that pose a great threat to both their kids and the parents themselves. Inside this book you wil...
|
|
cena:
54,41 zł |
Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management
ISBN: 9781615208913 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, interacting within, and managing them securely. Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning,...
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environm...
|
|
cena:
1038,16 zł |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
ISBN: 9781609601232 / Angielski / Twarda / 316 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational an...
|
|
cena:
1038,16 zł |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
|
cena:
1038,16 zł |
Trustworthy Internet
ISBN: 9788847018174 / Angielski / Miękka / 388 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and dedicated this year to the theme "Trustworthy Internet." The workshop provided a lively discussion on the challenges involved in reshaping the Internet into a trustworthy reality, articulated around the Internet by and for People, the Internet of Contents, the Internet of Services and the Internet of Things, supported by the Network Infrastructure foundation. The papers have been revised after the workshop to take account of feedbacks received...
This book collects a selection of the papers presented at the 21st International Tyrrhenian Workshop on Digital Communications, organized by CNIT and ...
|
|
cena:
574,29 zł |
Moodle 1.9 Top Extensions Cookbook
ISBN: 9781849512169 / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Moodle is growing at a seemingly unstoppable rate. One of the key reasons for its popularity lies in its potential to extend with modules, thus making the site easier to administer, add new features, and completely change the way it looks. This book finds you the best Moodle modules, teaches you how to install them, and helps you to master their configuration. There are hundreds of Moodle modules available. Find out which you can trust and how to put them to work. This practical book gives you hands-on experience on using and managing Moodle modules, thus making your learning website...
Moodle is growing at a seemingly unstoppable rate. One of the key reasons for its popularity lies in its potential to extend with modules, thus making...
|
|
cena:
237,94 zł |
3 Surefire Ways to Back Up Your WordPress Blog: Step-by-Step Ways to Protect Your Blog from Disappearing
ISBN: 9781456420222 / Angielski / Miękka / 58 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's gone. What will YOU do? Well, if you've backed it up, then you'll just restore it. Problem solved Did you know, that it's not AUTOMATICALLY backed up? And that it's NOT easy to back it up? Didn't think so... This is where "3 Surefire Ways to Back Up Your WordPress Blog" comes in. Ron gives you three ways to back up your WordPress blog. The first one is for non-techies or those who don't want to learn how to do it and describes the important...
So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's g...
|
|
cena:
68,17 zł |
FIPS 140 Demystified: An Introductory Guide for Vendors
ISBN: 9781460990391 / Angielski / Miękka / 226 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
|
|
cena:
91,02 zł |
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
ISBN: 9781613505076 / Angielski / Twarda / 372 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
|
|
cena:
1124,68 zł |