The Abilene Net
ISBN: 9781418442262 / Angielski / Miękka / 244 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
|
cena:
90,31 zł |
Techno-Security in an Age of Globalization: Perspectives from the Pacific Rim
ISBN: 9781563246722 / Angielski / Twarda / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and traditional military security issues seem to have receded due to the end of the Cold War.
This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and tradit...
|
|
cena:
191,87 zł |
Techno-Security in an Age of Globalization: Perspectives from the Pacific Rim
ISBN: 9781563246739 / Angielski / Miękka / 288 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and traditional military security issues seem to have receded due to the end of the Cold War.
This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and tradit...
|
|
cena:
103,69 zł |
Building Internet Firewalls
ISBN: 9781565928718 / Angielski / Miękka / 896 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have... In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong i... |
|
cena:
262,03 zł |
De-mystifying the IPsec Puzzle
ISBN: 9781580530798 / Angielski / Twarda / 296 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detailed presentation of the revolutionary IPsec technology used to create Virtual Private Networks and, in the near future, will be used to protect the infrastructure of the Internet itself.
This innovative, new book offers professionals a global, integrated approach to providing Internet Security at the network layer. It provides a detail...
|
|
cena:
541,84 zł |
Internet and Intranet Security
ISBN: 9781580531665 / Angielski / Twarda / 432 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances the ability to create and deploy secure architectures. It gives users the knowledge needed for improved productivity, whether setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.
This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enh...
|
|
cena:
614,09 zł |
Understanding Voice Over IP Security
ISBN: 9781596930506 / Angielski / Twarda / 261 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
|
|
cena:
634,74 zł |
Stealing the Network: How to Own an Identity
ISBN: 9781597490061 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the...
The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics ...
|
|
cena:
279,20 zł |
Configuring Check Point Ngx Vpn-1/Firewall-1
ISBN: 9781597490313 / Angielski / Miękka / 625 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is...
Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered user...
|
|
cena:
339,91 zł |
Practical Voip Security
ISBN: 9781597490603 / Angielski / Miękka / 563 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network...
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must...
|
|
cena:
327,77 zł |
Developer's Guide to Web Application Security
ISBN: 9781597490610 / Angielski / Miękka / 500 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasing...
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-st...
|
|
cena:
339,91 zł |
Dr. Tom Shinder's ISA Server 2006 Migration Guide
ISBN: 9781597491990 / Angielski / Miękka / 637 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. * Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange... Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
|
|
cena:
191,87 zł |
Cyber Terrorism: Political and Economic Implications
ISBN: 9781599040219 / Angielski / Twarda / 194 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global...
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objec...
|
|
cena:
489,95 zł |
Secure E-Government Web Services
ISBN: 9781599041384 / Angielski / Twarda / 335 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
|
|
cena:
576,47 zł |
SpamAssassin: A practical guide to integration and configuration
ISBN: 9781904811121 / Angielski / Miękka / 240 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator,...
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business require...
|
|
cena:
213,65 zł |
Checkpoint Next Generation Security Administration
ISBN: 9781928994749 / Angielski / Miękka / 752 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security... Unparalleled security management that IT professionals have been waiting for.
Check Point Software Technologies is the worldwide leader in securing... |
|
cena:
388,48 zł |
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
ISBN: 9783540661306 / Angielski / Miękka / 506 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic...
Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components ori...
|
|
cena:
191,40 zł |
Security in Distributed and Networking Systems
ISBN: 9789812708076 / Angielski / Twarda / 512 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
|
|
cena:
829,92 zł |
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions
ISBN: 9781599048048 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms,...
|
|
cena:
576,47 zł |
Multimedia Forensics and Security
ISBN: 9781599048697 / Angielski / Twarda / 418 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
|
|
cena:
1038,16 zł |