Filtruj wg
Filtruj według

Data wydania

1971 rok - 2024 rok

Autor

Dostępność

Cena

0,00 zł - 20 627,00 zł

Czas dostawy

2 dni - 30 dni

Wydawnictwo

Bezpieczeństwo komputerowe

Filtruj wg

CCNA Cyber Ops SECFND No.210-250 Official Cert Guide

Autor: Joseph Muniz
Omar Santos
Stefano De Crescenzo
Data wydania: 2017
CCNA Cyber Ops SECFND 210-250 Official Cert Guide from Cisco Press allows you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco enterprise security experts Omar Santos, Joseph Muniz, and Stefano De Crescenzo share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam Do I Know This Already? quizzes, which allow you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly The powerful Pearson Test Prep practice test software, with two full
200,00 zł
  • Nowy

CCNA Cyber Ops SECOPS No.210-255 Official Cert Guide

Autor: Joseph Muniz
Omar Santos
Data wydania: 2017
Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master CCNA Cyber Ops SECOPS #210-255 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions CCNA Cyber Ops SECOPS 210-255 Official Cert Guide is a best-of-breed exam study guide. Best-selling authors and internationally respected cybersecurity experts Omar Santos and Joseph Muniz share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing
193,00 zł -6,34% 180,76 zł
  • -6,34%
  • Nowy

Certified Ethical Hacker (CEH) Version 9 Cert Guide

Autor: Michael Gregg
Data wydania: 2017
In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael’s concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. · Every feature of this book supports both efficient exam preparation and long-term mastery: · Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council’s official exam objectives · Key Topics figures, tables, and lists call attention to the information that’s most crucial for exam success · Exam Preparation Tasks enable you to review key
239,00 zł
  • Nowy

Computer Security Privacy and Politics

Autor: R Subramanian
Data wydania: 2008
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spyware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism - all of these have a profound effect on our daily computing operations and habits, with major political and social implications.""Computer Security, Privacy and Politics"" connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this Premier Reference Source compiles
229,95 zł
  • Nowy

Information Security Management Handbook CD-ROM

Autor: Harold Tipton
Micki Krause
Tipton, Krause
Data wydania: 2009
The multi-volume set of the Information Security Management Handbook is now available on CD-ROM. Containing the complete contents of the set, you get a resource that is portable, linked and searchable by keyword, and organized under the CISSP(R) Common Body of Knowledge (CBK) domains. In addition to an electronic version of the most comprehensive resource for information security management, this CD-ROM contains an extra volume's worth of information- including chapters from other security and networking books that have never appeared in the print editions-that you simply won't find anywhere else. Exportable text and hard copies are available at the click of a mouse.
22,00 zł
  • Nowy

Introduction to Computer Networks and Cybersecurity

Autor: Chwan-Hwa Wu
Chwan-Hwa Wu
Chwan-Hwa Wu
David Irwin
Data wydania: 2013
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks-through the Internet architecture. Part 1 covers the most important Internet applications and the methods used
1 016,00 zł
  • Nowy

Intrusion Signatures & Analysis

Autor: Karen Frederick
Mark Cooper
Mark Garrett Cooper
Matt Fearnow
Stephen Northcutt
Data wydania: 2001
Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.
154,00 zł
  • Nowy

The IKEv2 IPsec Virtual Private Networks

Autor: Amjad Inamdar
Graham Bartlett
Data wydania: 2016
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN The IKEv2 protocol significantly improves VPN security, and Cisco’s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network security experts offer a complete, easy-tounderstand, and practical introduction to IKEv2, modern IPsec VPNs, and FlexVPN. The authors explain each key concept, and then guide you through all facets of FlexVPN planning, deployment, migration, configuration, administration, troubleshooting, and optimization. You’ll discover how IKEv2 improves on IKEv1, master key IKEv2 features, and learn how to
265,00 zł
  • Nowy

InfoSecurity 2008 Threat Analysis

Autor: Colby DeRodeff
Colby DeRodeff
Craig Schiller
Craig Schiller
Michael Gregg
Michael Gregg
Seth Fogie
Seth Fogie
Data wydania: 2007
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such as: Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence and Payment Card Industry (PCI).
254,10 zł
  • Nowy

No Tech Hacking

Autor: Johnny Long
Johnny Long
Data wydania: 2008
In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, the authors get paid to uncover weaknesses in those systems and exploit them. This book reveals those secrets.
207,90 zł
  • Nowy

OS X Exploits and Defense

Autor: Chris Hurley
Chris Hurley
David Harley
David Harley
Gary Porteus
Gary Porteus
Johnny Long
Johnny Long
Kevin Finisterre
Kevin Finisterre
Larry H.
Larry H.
Paul Baccas
Paul Baccas
Data wydania: 2008
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
240,45 zł
  • Nowy

Seven Deadliest Microsoft Attacks

Autor: Brian Barber
Brian Barber
Mike Borkin
Mike Borkin
Naomi Alpern
Naomi Alpern
Rob Kraus
Rob Kraus
Data wydania: 2010
Pinpoints the dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure.
88,20 zł
  • Nowy

Software-Defined Networking and Security

Autor: Ankur Chowdhary
Ankur Chowdhary
Dijiang Huang
Dijiang Huang
Sandeep Pisharody
Sandeep Pisharody
Data wydania: 2018
This book seeks to educate the reader regarding Cyber Maneuver or Adaptive Cyber Defense.
480,00 zł
  • Nowy

Syngres Force 2006 Emerging Threat Analysis

Autor: Robert Graham
Robert Graham
Data wydania: 2006
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.
210,00 zł
  • Nowy