![]() |
Building Internet Firewalls
ISBN: 9781565928718 / Angielski / Miękka / 896 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have... In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong i... |
cena:
233,60 zł |
![]() |
De-mystifying the IPsec Puzzle
ISBN: 9781580530798 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detailed presentation of the revolutionary IPsec technology used to create Virtual Private Networks and, in the near future, will be used to protect the infrastructure of the Internet itself.
This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detail...
|
cena:
480,19 zł |
![]() |
Internet and Intranet Security
ISBN: 9781580531665 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances the ability to create and deploy secure architectures. It gives users the knowledge needed for improved productivity, whether setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enh...
|
cena:
544,20 zł |
![]() |
Understanding Voice Over IP Security
ISBN: 9781596930506 / Angielski / Twarda / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
|
cena:
562,50 zł |
![]() |
Dr. Tom Shinder's ISA Server 2006 Migration Guide
ISBN: 9781597491990 / Angielski / Miękka / 637 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange... Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
|
cena:
180,06 zł |
![]() |
Cyber Terrorism: Political and Economic Implications
ISBN: 9781599040219 / Angielski / Twarda / 194 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global...
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objec...
|
cena:
434,20 zł |
![]() |
Secure E-Government Web Services
ISBN: 9781599041384 / Angielski / Twarda / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
|
cena:
507,28 zł |
![]() |
Handbook of Research on Wireless Security: 2 V
ISBN: 9781599048994 / Angielski / Twarda / 934 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless...
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and servic...
|
cena:
2659,36 zł |
![]() |
SpamAssassin: A practical guide to integration and configuration
ISBN: 9781904811121 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator,...
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business require...
|
cena:
189,34 zł |
![]() |
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
ISBN: 9783540661306 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic...
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components ori...
|
cena:
201,72 zł |
![]() |
Security in Distributed and Networking Systems
ISBN: 9789812708076 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
|
cena:
778,85 zł |
![]() |
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions
ISBN: 9781599048048 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms,...
|
cena:
510,87 zł |
![]() |
Multimedia Forensics and Security
ISBN: 9781599048697 / Angielski / Twarda / 418 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
|
cena:
920,01 zł |
![]() |
Handbook of Research on Information Security and Assurance
ISBN: 9781599048550 / Angielski / Twarda / 586 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
|
cena:
1354,47 zł |
![]() |
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
ISBN: 9780596514839 / Angielski / Miękka / 314 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite. Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ... |
cena:
153,68 zł |
![]() |
Cybercrime: Secure It or Lose It
ISBN: 9780595481705 / Angielski / Miękka / 200 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information security and audit personnel will find value in the materials provided in this book to establish and maintain a comprehensive information security program and to aid in satisfying regulatory compliance requirements.
"Cybercrime: Secure IT or Lose IT" looks at the who, what, why, when, and where of Internet crime from the perspective of businesspeople. Information ...
|
cena:
68,99 zł |
![]() |
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
ISBN: 9783836464963 / Angielski / Miękka / 80 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
|
cena:
227,78 zł |
![]() |
IPv6 Security
ISBN: 9781587055942 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. IPv6 Security Protection measures for the next Internet Protocol As the world s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component...
IPv6 Security Protection measures for the next Internet Protocol As the world s networks migrate to the IPv6 protocol, netwo...
|
cena:
275,47 zł |
![]() |
Computer Security - Esorics 94: Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings
ISBN: 9783540586180 / Angielski / Twarda / 474 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
Th... |
cena:
201,72 zł |
![]() |
Handbook of Security and Networks
ISBN: 9789814273039 / Angielski / Twarda / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
|
cena:
885,94 zł |