Filtruj wg
Filtruj według

Data wydania

1971 rok - 2024 rok

Autor

Dostępność

Cena

0,00 zł - 20 627,00 zł

Czas dostawy

2 dni - 30 dni

Wydawnictwo

Data encryption

Filtruj wg

Computer Security Privacy and Politics

Autor: R Subramanian
Data wydania: 2008
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spyware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism - all of these have a profound effect on our daily computing operations and habits, with major political and social implications.""Computer Security, Privacy and Politics"" connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a special focus on the relevance and implications of global privacy, law, and politics for society, individuals, and corporations. An estimable addition to any library collection, this Premier Reference Source compiles
229,95 zł
  • Nowy

InfoSecurity 2008 Threat Analysis

Autor: Colby DeRodeff
Colby DeRodeff
Craig Schiller
Craig Schiller
Michael Gregg
Michael Gregg
Seth Fogie
Seth Fogie
Data wydania: 2007
Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such as: Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence and Payment Card Industry (PCI).
254,10 zł
  • Nowy

Intrusion Signatures & Analysis

Autor: Karen Frederick
Mark Cooper
Mark Garrett Cooper
Matt Fearnow
Stephen Northcutt
Data wydania: 2001
Intrusion Detection is a red-hot topic in today's technology and security field. You hear daily stories of networks compromised or rendered unusable by attack. The cyber-criminals behind this must be stopped. The majority of the security analysts working today are not properly trained to do their important work, and often have to learn on the job or on their own. This book empowers the security specialist to analyze and interpret the traces that they are seeing, find their source, and stop the intrusion. This book also contains must-have information for the experienced intrusion analyst.
154,00 zł
  • Nowy

OS X Exploits and Defense

Autor: Chris Hurley
Chris Hurley
David Harley
David Harley
Gary Porteus
Gary Porteus
Johnny Long
Johnny Long
Kevin Finisterre
Kevin Finisterre
Larry H.
Larry H.
Paul Baccas
Paul Baccas
Data wydania: 2008
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
240,45 zł
  • Nowy

Syngres Force 2006 Emerging Threat Analysis

Autor: Robert Graham
Robert Graham
Data wydania: 2006
An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.
210,00 zł
  • Nowy