| |
Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer...
Editeur :
Butterworth-Heinemann
Parution :
2005-04-28
PDF sans DRM
|
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...
Editeur :
Syngress
Parution :
2005-04-26
PDF sans DRM
|
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how...
Editeur :
Morgan Kaufmann
Parution :
2005-04-25
PDF sans DRM
|
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark...
Editeur :
Syngress
Parution :
2005-04-12
PDF sans DRM
|
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...
Editeur :
Wiley
Parution :
2005-04-01
PDF
|
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...
Editeur :
Syngress
Parution :
2005-03-15
epub sans DRM
|
Intrusion Prevention and Active Response provides an introduction to the field ofIntrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response...
Editeur :
Syngress
Parution :
2005-03-04
PDF sans DRM
|
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...
Editeur :
Syngress
Parution :
2005-02-17
PDF sans DRM
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2005-01-26
PDF
|
Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the...
Editeur :
Morgan Kaufmann
Parution :
2005-01-19
epub sans DRM
|
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and...
Editeur :
Syngress
Parution :
2004-12-31
epub sans DRM
|
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security...
Editeur :
Syngress
Parution :
2004-12-31
PDF sans DRM
|
From the voice on the phone, to the voice on the computer, to the voice from the toaster, speech user interfaces are coming into the mainstream and are here to stay forever. Soundly anchored in HCI, cognitive psychology, linguistics, and social psychology, this...
Editeur :
Morgan Kaufmann
Parution :
2004-12-31
PDF sans DRM
|
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private...
Editeur :
Digital Press
Parution :
2004-12-21
PDF sans DRM
|
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users...
Editeur :
Syngress
Parution :
2004-12-17
PDF sans DRM
|
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to...
Editeur :
Syngress
Parution :
2004-11-20
PDF sans DRM
|
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals...
Editeur :
Syngress
Parution :
2004-11-05
PDF sans DRM
|
How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle.
- The...
Editeur :
Syngress
Parution :
2004-09-23
PDF sans DRM
|
Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one...
Editeur :
Butterworth-Heinemann
Parution :
2004-09-21
PDF sans DRM
|
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...
Editeur :
Wiley
Parution :
2004-07-30
PDF
|