Télécharger le livre :  Risk Management for Computer Security
Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer...

Editeur : Butterworth-Heinemann
Parution : 2005-04-28
PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...

Editeur : Syngress
Parution : 2005-04-26
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how...

Editeur : Morgan Kaufmann
Parution : 2005-04-25
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Aggressive Network Self-Defense
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark...

Editeur : Syngress
Parution : 2005-04-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Spies Among Us
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Editeur : Wiley
Parution : 2005-04-01
PDF

25,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

Editeur : Syngress
Parution : 2005-03-15
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Intrusion Prevention and Active Response
Intrusion Prevention and Active Response provides an introduction to the field ofIntrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response...

Editeur : Syngress
Parution : 2005-03-04
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Apple I Replica Creation
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...

Editeur : Syngress
Parution : 2005-02-17
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Intrusion
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2005-01-26
PDF

16,35

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Understanding Your Users
Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the...

Editeur : Morgan Kaufmann
Parution : 2005-01-19
epub sans DRM

68,52

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and...

Editeur : Syngress
Parution : 2004-12-31
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring NetScreen Firewalls
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security...

Editeur : Syngress
Parution : 2004-12-31
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Voice Interaction Design
From the voice on the phone, to the voice on the computer, to the voice from the toaster, speech user interfaces are coming into the mainstream and are here to stay forever. Soundly anchored in HCI, cognitive psychology, linguistics, and social psychology, this...

Editeur : Morgan Kaufmann
Parution : 2004-12-31
PDF sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Firewalls
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private...

Editeur : Digital Press
Parution : 2004-12-21
PDF sans DRM

66,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users...

Editeur : Syngress
Parution : 2004-12-17
PDF sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to...

Editeur : Syngress
Parution : 2004-11-20
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals...

Editeur : Syngress
Parution : 2004-11-05
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Small Business Server 2003
How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle. - The...

Editeur : Syngress
Parution : 2004-09-23
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Trojans, Worms, and Spyware
Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one...

Editeur : Butterworth-Heinemann
Parution : 2004-09-21
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malicious Cryptography
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Editeur : Wiley
Parution : 2004-07-30
PDF

43,25

Téléchargement immédiat
Dès validation de votre commande
<< < 3031323334 >