71 livres(s)
Télécharger le livre :  Predicting Malicious Behavior
Ajouter à ma liste d'envies

Predicting Malicious Behavior


Gary M. Jackson


A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and...

Parution : 2012-05-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
49,58
Télécharger le livre :  Cyber Security Policy Guidebook
Ajouter à ma liste d'envies

Cyber Security Policy Guidebook


Collectif


Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on...

Parution : 2012-03-28
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
102,28
Télécharger le livre :  The Web Application Hacker's Handbook
Ajouter à ma liste d'envies

The Web Application Hacker's Handbook


Marcus Pinto , Dafydd Stuttard


The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users....

Parution : 2011-08-30
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
53,80
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies

The Art of Deception


Kevin D. Mitnick , William L. Simon


The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and...

Parution : 2011-08-04
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
15,61
Télécharger le livre :  Web Commerce Security
Ajouter à ma liste d'envies

Web Commerce Security


Ronald L. Krutz , Hadi Nahari


A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...

Parution : 2011-05-04
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
54,12
Télécharger le livre :  Network Security Bible
Ajouter à ma liste d'envies

Network Security Bible


Eric Cole


The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the...

Parution : 2011-03-31
Format(s) : PDF, ePub
Éditeur : Wiley
Collection : Bible
J'achète
54,12
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies

Secrets and Lies


Bruce Schneier


Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Parution : 2011-03-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
27,43
Télécharger le livre :  Cryptography Engineering
Ajouter à ma liste d'envies

Cryptography Engineering


Niels Ferguson , Tadayoshi Kohno , Bruce Schneier


The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...

Parution : 2011-02-02
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
51,70
Télécharger le livre :  Implementing SSL / TLS Using Cryptography and PKI
Ajouter à ma liste d'envies

Implementing SSL / TLS Using Cryptography and PKI


Joshua Davies


Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS),...

Parution : 2011-01-11
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
56,97
Télécharger le livre :  Malware Analyst's Cookbook and DVD
Ajouter à ma liste d'envies

Malware Analyst's Cookbook and DVD


Steven Adair , Blake Hartstein , Michael Ligh , Matthew Richard


A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses,...

Parution : 2010-10-01
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
54,12
Télécharger le livre :  Cloud Security
Ajouter à ma liste d'envies

Cloud Security


Ronald L. Krutz , Russell Dean Vines


Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital...

Parution : 2010-08-31
Format(s) : ePub
Éditeur : Wiley
J'achète
48,00
Télécharger le livre :  Security in a Web 2.0+ World
Ajouter à ma liste d'envies

Security in a Web 2.0+ World


Carlos Curtis Solari


Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know...

Parution : 2010-04-27
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
37,98
Télécharger le livre :  Unauthorised Access
Ajouter à ma liste d'envies

Unauthorised Access


Wil Allsopp


The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT...

Parution : 2010-03-25
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
37,98
Télécharger le livre :  Information Security Governance
Ajouter à ma liste d'envies

Information Security Governance


Krag Brotby


The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...

Parution : 2009-04-14
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
107,56
Télécharger le livre :  Security in a Web 2.0+ World
Ajouter à ma liste d'envies

Security in a Web 2.0+ World


Carlos Curtis Solari


Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...

Parution : 2009-04-08
Format(s) : PDF
Éditeur : Wiley
J'achète
39,56
Télécharger le livre :  The Art of Intrusion
Ajouter à ma liste d'envies

The Art of Intrusion


Kevin D. Mitnick , William L. Simon


Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Parution : 2009-03-17
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
18,99
Ajouter à ma liste d'envies

Schneier on Security


Bruce Schneier


Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...

Parution : 2009-03-16
Format(s) : PDF, ePub
Éditeur : Wiley
J'achète
28,80
Télécharger le livre :  The Best of 2600, Collector's Edition
Ajouter à ma liste d'envies

The Best of 2600, Collector's Edition


Emmanuel Goldstein


In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans...

Parution : 2009-01-26
Format(s) : PDF
Éditeur : Wiley
J'achète
91,15
Télécharger le livre :  Hardware-based Computer Security Techniques to Defeat Hackers
Ajouter à ma liste d'envies

Hardware-based Computer Security Techniques to Defeat Hackers


Roger R. Dube


Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and...

Parution : 2008-09-22
Format(s) : PDF
Éditeur : Wiley
J'achète
131,82
Télécharger le livre :  Managing Risk
Ajouter à ma liste d'envies

Managing Risk


Romney Beecher Duffey , John Walton Saull


The human element is the principle cause of incidents and accidents in all technology industries; hence it is evident that an understanding of the interaction between humans and technology is crucial to the effective management of risk. Despite this, no tested model...

Parution : 2008-09-15
Format(s) : PDF
Éditeur : Wiley
J'achète
160,31
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés