ilość książek w kategorii: 3914
Protecting Yourself Online: An Electronic Frontier Foundation Guide
ISBN: 9780062515124 / Angielski / Miękka / 1998 / 224 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The Electronic Frontier Foundation, the premier cyberspace civil liberties organization, presents the most comprehensive and authoritative guide to protecting personal rights and safety in the electronic world. Graphs & charts.
The Electronic Frontier Foundation, the premier cyberspace civil liberties organization, presents the most comprehensive and authoritative guide to pr...
|
|
cena:
69,05 zł |
Wi-Fi Security
ISBN: 9780071410731 / Angielski / Miękka / 2003 / 309 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real ones, and arming investors with the facts they need to make informed decisions. This guide to understanding options includes such new material as references to online sites relevant to options investors; information on how to pick brokerage firms; detailed explanations of risk; bailout points; how to pick stocks for options investing; and how put options can enhance portfolio returns. This fifth edition also contains examples, updated charts, and...
In nontechnical, easy-to-follow terms, this text seeks to thoroughly demystify the options markets, distinguishing the imagined risks from the real on...
|
|
cena:
265,60 zł |
Software Forensics
ISBN: 9780071428040 / Angielski / Miękka / 2004 / 215 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Follow the trail. Catch the perp.
From one of the world's foremost investigators of computer viruses comes this comprehensive tutorial on solving cyber crimes and bringing perpetrators to justice. Author Robert M. Slade's "Software Forensics" provides expert instruction in tracking and identifying cybercriminals. A professional security consultant to Fortune 500 companies since 1987, Rob Slade teaches you the tools and methods he uses to find the invisible "DNA" on malicious computer code. The Only Comprehensive Technical Reference on the Tools and Tactics of Cybercrime Investigation and... Follow the trail. Catch the perp.
From one of the world's foremost investigators of computer viruses comes this comprehensive tutorial on solving cy... |
|
cena:
211,46 zł |
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
ISBN: 9780071494618 / Angielski / Miękka / 2008 / 258 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and... Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.... |
|
cena:
276,19 zł |
IPSec: Securing VPNs
ISBN: 9780072127577 / Angielski / Miękka / 2001 / 436 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation of IPSec components, implementation, and VPN interoperability. It is a part of the RSA Press series.
Written in conjunction with RSA Security - the most trusted name in e-security - this book gives a presentation of IPSec components, implementation, a...
|
|
cena:
263,25 zł |
Hacker's Challenge: Test Your Incident Response Skills Using 20 Scenarios
ISBN: 9780072193848 / Angielski / Miękka / 2001 / 300 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.
Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and incident response skills with 20 real-world hacks presented by upper-echelon security experts. Important topics are covered, including Denial of Service, wireless technologies, Web attacks, and malicious code. Each challenge includes a detailed explanation of the... "A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, secu...
|
|
cena:
159,67 zł |
XML Security
ISBN: 9780072193992 / Angielski / Miękka / 2002 / 379 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
This volume explains how to implement XML security. The book brings the reader up to speed fast with both an XML primer and a security primer.
|
|
cena:
315,03 zł |
Broadband Network & Device Security
ISBN: 9780072194241 / Angielski / Miękka / 2002 / 508 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This volume demonstrates how to incorporate security within the underlying network infrastructure, and discusses performance, cost and manageability.
This volume demonstrates how to incorporate security within the underlying network infrastructure, and discusses performance, cost and manageability.
...
|
|
cena:
315,03 zł |
McOmmerce Security: A Beginner's Guide
ISBN: 9780072194609 / Angielski / Miękka / 2002 / 500 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to increase revenue and offer customers a new level of convenience. Mobile phones and PDAs can now be used for online banking, purchasing tickets, messaging, and much more. For any transaction, security is a top priority--and this becomes increasingly complex when wireless and mobile applications are involved. This practical introductory guide clearly explains different mCommerce applications and their associated security risks. Through case studies,... Learn to implement a solid mCommerce security plan--from start to finish
Many businesses today recognize mobile commerce--mCommerce--as a way to inc... |
|
cena:
211,46 zł |
Biometrics
ISBN: 9780072222272 / Angielski / Miękka / 2002 / 416 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something you do (signature) and something you are (fingerprint).
This text offers a comprehensive tutorial on the four categories of authentication: something you know (PINs), something you have (tokens), something ...
|
|
cena:
263,25 zł |
Wireless Security
ISBN: 9780072222869 / Angielski / Miękka / 2002 / 496 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a security system to protect your wireless network and keep hackers out.
Presents details on major mobile/wireless clients and operating systems. This guide to wireless security helps you learn how to design and implement a...
|
|
cena:
263,25 zł |
Check Point VPN-1/Fire Wall-1 NG Administration
ISBN: 9780072223422 / Angielski / Miękka / 2003 / 512 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. This work includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.
Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Th...
|
|
cena:
263,25 zł |
IIS Security
ISBN: 9780072224399 / Angielski / Miękka / 2002 / 468 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. This work provides coverage of Web security threats and vulnerabilities on the Internet and on intranets. It gives advice on how to detect and respond to security breaches. It also covers the basic security tools that come with IIS and are managed with the IIS Administration console, shows the weaknesses of these tools, and provides more sophisticated tools that can be utilized to protect the IIS server. Included are implementation techniques on multiple security methods, such as authentication, encryption, authorization, filtering and restrictions to protect against hacking and loss.
This work provides coverage of Web security threats and vulnerabilities on the Internet and on intranets. It gives advice on how to detect and respond...
|
|
cena:
263,25 zł |
Web Services Security
ISBN: 9780072224719 / Angielski / Miękka / 2003 / 312 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerberos. You'll also find details on Security Assertion Markup Language (SAML), XML Key Management Specification (XKMS), XML Encryption, Hypertext Transfer Protocol-Reliability (HTTP-R) and more.
Explains how to implement secure Web services and includes coverage of trust, confidentiality, cryptography, authentication, authorization, and Kerber...
|
|
cena:
250,30 zł |
Windows XP Professional Security
ISBN: 9780072226027 / Angielski / Miękka / 2002 / 416 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows XP Professional.
Windows XP Professional Security provides IT professionals with comprehensive security coverage of Microsoft's popular new operating system, Windows X...
|
|
cena:
263,25 zł |
DVD Confidential 2: The Sequel
ISBN: 9780072229868 / Angielski / Miękka / 2003 / 183 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Shows readers the hidden gems in their existing DVD collections and is full of hun facts on movie trivia and Top Ten lists.
Shows readers the hidden gems in their existing DVD collections and is full of hun facts on movie trivia and Top Ten lists.
|
|
cena:
94,94 zł |
Hardening Linux
ISBN: 9780072254976 / Angielski / Miękka / 2004 / 404 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the first place.
Shows you how to bullet proof your system before you are hacked. This book also shows you how to secure your Linux system to work securely in the firs...
|
|
cena:
211,46 zł |
Hardening Network Infrastructure
ISBN: 9780072255027 / Angielski / Miękka / 2004 / 580 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Shows network administrators and IT pros how to harden their network infrastructure against hackers.
Shows network administrators and IT pros how to harden their network infrastructure against hackers.
|
|
cena:
211,46 zł |
Hacking Exposed Cisco Networks: Cisco Security Secrets & Solutions
ISBN: 9780072259179 / Angielski / Miękka / 2006 / 400 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed method...
|
|
cena:
306,40 zł |
Hacker's Challenge 3: 20 Brand New Forensic Scenarios & Solutions
ISBN: 9780072263046 / Angielski / Miękka / 2006 / 400 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP,... The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security ... |
|
cena:
306,40 zł |