Practical Unix and Internet Security
ISBN: 9780596003234 / Angielski / Miękka / 988 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular... When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host s... |
|
cena:
238,86 zł |
Essential PHP Security
ISBN: 9780596006563 / Angielski / Miękka / 109 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks. Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of... Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web developm... |
|
cena:
130,19 zł |
Mapping Hacks: Tips & Tools for Electronic Cartography
ISBN: 9780596007034 / Angielski / Miękka / 525 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountain trails to Jacques Cousteau's sophisticated charts of the ocean floor, creating maps of the utmost precision has been a constant pursuit. So why should things change now?Well, they shouldn't. The reality is that map creation, or "cartography," has only improved in its ease-of-use over time. In fact, with the recent explosion of inexpensive computing and the growing availability of public mapping data, mapmaking today extends all the way to the... Since the dawn of creation, man has designed maps to help identify the space that we occupy. From Lewis and Clark's pencil-sketched maps of mountai... |
|
cena:
130,19 zł |
Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance
ISBN: 9780596802769 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is?... |
|
cena:
152,83 zł |
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
ISBN: 9781118362181 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. ...Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed ho... |
|
cena:
207,43 zł |
Android Hacker's Handbook
ISBN: 9781118608647 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed... The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to in... |
|
cena:
212,94 zł |
Social Media Security: Leveraging Social Networking While Mitigating Risk
ISBN: 9781597499866 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter);... Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro... |
|
cena:
207,43 zł |
Nagios Core Administrators Cookbook
ISBN: 9781849515566 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
|
|
cena:
267,73 zł |
Mobile Security: How to Secure, Privatize and Recover Your Devices
ISBN: 9781849693608 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security...
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your p...
|
|
cena:
238,52 zł |
The Internet Police: How Crime Went Online--And the Cops Followed
ISBN: 9780393349450 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road.
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find... With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road....
|
|
cena:
70,93 zł |
Cuckoo Malware Analysis
ISBN: 9781782169239 / Angielski / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
|
|
cena:
204,44 zł |
Vmware Vcloud Security
ISBN: 9781782170969 / Angielski / Miękka / 114 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own hardware and software. The alternative is to deploy the services you need on a public cloud infrastructure provided by an external supplier such as Amazon Web Services, Rackspace Cloud, or HP Public Cloud. While a public cloud can afford greater flexibility, a private cloud gives you the advantage of greater control over the entire stack. "VMware vCloud Security" focuses on some critical security risks, such as the application level firewall...
Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own...
|
|
cena:
214,17 zł |
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
ISBN: 9780128000113 / Angielski / Miękka / 152 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal... Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat o... |
|
cena:
108,87 zł |
Pond of Scams
ISBN: 9781532985805 / Angielski / Miękka / 90 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
40,86 zł |
Cyberbullying and the Wild, Wild Web: What You Need to Know
ISBN: 9781442251175 / Angielski / Twarda / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The world has changed drastically over the past decade. The Internet has had a huge part in that, as it has made the world more accessible to anyone of any age, race, or gender. Used for entertainment, education, shopping, dating and more, the internet has provided a whole new virtual world for everyone to enjoy. But with the good also comes the bad--and for kids and teens these days, the bad has becomes a constant threat from cyberbullies and cyberstalking. J. A. Hitchcock began to have an interest in cyberstalking and cyberbullies in 1996 when she blew the whistle on a literary agency scam....
The world has changed drastically over the past decade. The Internet has had a huge part in that, as it has made the world more accessible to anyone o...
|
|
cena:
191,10 zł |
Cybersecurity and Applied Mathematics
ISBN: 9780128044520 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is... Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking... |
|
cena:
264,48 zł |
Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control
ISBN: 9780128043929 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the public. The book offers a systematic, 3-pronged approach for addressing the IT security deficits present in healthcare organizations of all sizes. Healthcare decision-makers are shown how to conduct an in-depth analysis of their organization's information risk level. After this assessment is complete, the book... Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tight... |
|
cena:
181,49 zł |
Hacking: Basic Security, Penetration Testing and How to Hack
ISBN: 9781329463158 / Angielski / Twarda / 148 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Within this book's pages, you'll find the answers to these questions and more. Just some of the questions and topics covered include: Penetration Testing Grey Hat Hacking Basic Security Guidelines General Tips Of Computer Safety How to Hack This book...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking...
|
|
cena:
175,08 zł |
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
ISBN: 9781466646919 / Angielski / Twarda / 577 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current... While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
|
|
cena:
1127,40 zł |
Internet Censorship: A Reference Handbook
ISBN: 9781610694810 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In "Internet Censorship: A Reference Handbook," experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why. The handbook shares key events associated... Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two... |
|
cena:
245,70 zł |