![]() |
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
ISBN: 9781118362181 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. ...Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed ho... |
cena:
195,30 |
![]() |
Android Hacker's Handbook
ISBN: 9781118608647 / Angielski / Miękka / 576 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed... The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to in... |
cena:
203,93 |
![]() |
Google Hacking for Penetration Testers, Volume 2
ISBN: 9781597491761 / Angielski / Miękka / 560 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system...
This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million...
|
cena:
234,50 |
![]() |
Social Media Security: Leveraging Social Networking While Mitigating Risk
ISBN: 9781597499866 / Angielski / Miękka / 328 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter);... Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro... |
cena:
198,65 |
![]() |
Nagios Core Administrators Cookbook
ISBN: 9781849515566 / Angielski / Miękka / 366 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major functions on a regular basis. "Nagios Core Administrators Cookbook" will show you how to use Nagios Core as a monitoring framework that understands the layers and subtleties of the network for intelligent monitoring and notification behaviour. Nagios Core Administrators Guide introduces the reader to methods of extending Nagios Core into a network monitoring solution. The book begins by covering the basic structure of hosts, services, and contacts...
Network monitoring requires significantly more than just pinging hosts. This cookbook will help you to comprehensively test your networks major funct...
|
cena:
240,57 |
![]() |
Mobile Security: How to Secure, Privatize and Recover Your Devices
ISBN: 9781849693608 / Angielski / Miękka / 242 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your personal information dangerously exposed. Your online safety is at risk and the threat of information being stolen from your device is at an all- time high. Your identity is yours, yet it can be compromised if you don t manage your phone or mobile device correctly. Gain the power to manage all your mobile devices safely. With the help of this guide you can ensure that your data and that of your family is safe. The threat to your mobile security...
The threat of hacking may be the most damaging on the internet. Mobile technology is changing the way we live, work, and play, but it can leave your p...
|
cena:
214,32 |
![]() |
The Internet Police: How Crime Went Online--And the Cops Followed
ISBN: 9780393349450 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road.
Once considered a borderless and chaotic virtual landscape, the Internet is now home to the forces of international law and order. It's not just computer hackers and cyber crooks who lurk in the dark corners of the Web--the cops are there, too. In The Internet Police, Ars Technica editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find... With a new afterword that brings the book's stories up to date, including law enforcement's dramatic seizure of the online black market Silk Road....
|
cena:
67,92 |
![]() |
Cuckoo Malware Analysis
ISBN: 9781782169239 / Angielski / Miękka / 142 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
|
cena:
183,70 |
![]() |
Vmware Vcloud Security
ISBN: 9781782170969 / Angielski / Miękka / 114 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own hardware and software. The alternative is to deploy the services you need on a public cloud infrastructure provided by an external supplier such as Amazon Web Services, Rackspace Cloud, or HP Public Cloud. While a public cloud can afford greater flexibility, a private cloud gives you the advantage of greater control over the entire stack. "VMware vCloud Security" focuses on some critical security risks, such as the application level firewall...
Security is a major concern, in particular now that everything is moving to the cloud. A private cloud is a cloud computing platform built on your own...
|
cena:
228,52 |
![]() |
The Basics of Digital Privacy: Simple Tools to Protect Your Personal Information and Your Identity Online
ISBN: 9780128000113 / Angielski / Miękka / 152 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal... Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat o... |
cena:
104,27 |
![]() |
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
ISBN: 9781466646919 / Angielski / Twarda / 577 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current... While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
|
cena:
1013,02 |
![]() |
Internet Censorship: A Reference Handbook
ISBN: 9781610694810 / Angielski / Miękka / 333 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two sides of the debate in depth. On the one side are those who believe censorship, to a greater or lesser degree, is acceptable; on the other are those who play the critical role of information freedom fighters. In "Internet Censorship: A Reference Handbook," experts help readers understand these diverse views on Internet access and content viewing, revealing how both groups do what they do and why. The handbook shares key events associated... Combining reference entries with perspective essays, this timely book undertakes an impartial exploration of Internet censorship, examining the two... |
cena:
261,45 |
![]() |
Read Me First: Password Protection and Identity Theft Prevention (2nd Edition)
ISBN: 9781490988870 / Angielski / Miękka / 40 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. More than 1 billion online usernames and passwords have been stolen by cybercriminals. Chances are that some of your passwords are already in the wrong hands. Password protection is more than meets the eye. This booklet offers you step-by-step instructions in creating strong passwords that are easy for you to remember but difficult for hackers to crack. It also tells you how to properly handle password security questions as well as smartphone and WiFi security. The booklet also reveals the most effective method for identity theft prevention. Every year, more than 12 million Americans have...
More than 1 billion online usernames and passwords have been stolen by cybercriminals. Chances are that some of your passwords are already in the wron...
|
cena:
28,67 |
![]() |
Getting Started with Fortigate
ISBN: 9781782178200 / Angielski / Miękka / 126 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
|
cena:
144,32 |
![]() |
Corporate Cyberwar
ISBN: 9789810897574 / Angielski / Miękka / 60 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
82,03 |
![]() |
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit
ISBN: 9783950309317 / Angielski / Miękka / 66 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can "feel" anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and...
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obta...
|
cena:
22,06 |
![]() |
What Happens in Vegas Stays on YouTube: Privacy Is Dead. The New Rules of Reputation.
ISBN: 9780991183500 / Angielski / Miękka / 192 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Privacy is dead. Reputations are dying. Don't let it happen to your company, your team, or your family. You need to turn this potential liability into leadership, and you need to start today. Learn the art and science behind why digital reputations are determining: business winners and losers, your child's future, effective vs. ineffective CEOs & school teachers, your team's culture, church congregation sizes, your next job, everything...
Privacy is dead. Reputations are dying. Don't let it happen to your company, your team, or your family. You need to turn this potential liability into...
|
cena:
69,68 |
![]() |
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
ISBN: 9781494783808 / Angielski / Miękka / 162 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
|
cena:
60,98 |
![]() |
Cyber Infrastructure Protection
ISBN: 9781470064358 / Angielski / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
98,39 |
![]() |
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology
ISBN: 9781477621059 / Angielski / Miękka / 82 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
65,58 |