Поиск книг по лучшей цене!

Актуальная информация о наличии книг в крупных интернет-магазинах и сравнение цен.


  • Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky. Cisco Security Professional's Guide to Secure Intrusion Detection Systems
    Cisco Security Professional's Guide to Secure Intrusion Detection Systems
    Michael Sweeney, C. Tate Baumrucker, James. D. Burton, Ido Dubrawsky
    Your Complete Guide to Cisco Enterprise IDS Management This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional?s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100). Review Intrusion Detection Systems Find coverage of the basic threats and attack types, as well as an overview of the various types of intrusion detection. Learn About Cisco Intrusion Detection Explore the nuts and bolts behind a Cisco-based IDS system, covering both Cisco?s "Active Defense" and "Defense in Depth" methodologies. Install Sensor Appliances Install the Cisco IDS appliances on your network and learn about password recovery. Install the Cisco Secure Policy Manager (CSPM) Review the Cisco...
  • Robert Stephens. Configuring Check Point NGX VPN-1/Firewall-1
    Configuring Check Point NGX VPN-1/Firewall-1
    Robert Stephens
    Book DescriptionConfiguring Check Point NGX VPN-1/FireWall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product as well as those deploying VPN-1/FireWall-1 for the first time. This book covers all of NGX's dramatic changes and new, enhanced features. You'll learn how to secure the integrity of your network's data, communications, and applications from a multitude of blended threats. Protect your network against breaches of its perimeter and Internet access points. Also, learn to recognize and prevent internal threats. Written by an all-star team of Check Point-Certified experts, this is the only book you will need to securely and efficiently deploy, troubleshoot, and maintain Check Point NGX. This book is also the perfect complementary study tool for Check Point's certification exams.
  • Eoghan Casey. Digital Evidence and Computer Crime
    Digital Evidence and Computer Crime
    Eoghan Casey
    Digital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism. Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical...
  • Greg Holden. Guide to Firewalls and Network Security: Intrusion Detection and VPNs
    Guide to Firewalls and Network Security: Intrusion Detection and VPNs
    Greg Holden
    This text is designed for the student and network administrator who need to learn the basics of network firewall security. It covers basic installation techniques, discusses how to make an intelligent choice of firewall technology, and presents basic firewall troubleshooting. It contains pedagogical features including chapter review questions, hands-on exercises and case projects that allow the reader to practice skills as they are learned. In addition, this text maps to the CheckPoint CCSA Certification.
  • Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty. How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat)
    How to Cheat at Configuring Open Source Security Tools (How to Cheat) (How to Cheat)
    Michael Gregg, Eric Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
    The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter. * Take Inventory See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate. * Use Nmap Learn how Nmap has more features and options than any other free scanner. * Implement Firewalls Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable. * Perform Basic Hardening Put an IT security policy in place so that you have a concrete set of...
  • Tim Speed, Juanita Ellis. Internet Security: A Jumpstart for Systems Administrators and IT Managers
    Internet Security: A Jumpstart for Systems Administrators and IT Managers
    Tim Speed, Juanita Ellis
    Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data. · Shield data from both the internal and external intruder · Discover products that can detect and prevent these break-ins · Protect against major losses with the latest incident handling procedures for detecting and...
  • Elias Khasner, Laura E. Hunter. MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298
    MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298
    Elias Khasner, Laura E. Hunter
    According to MCP Magazine, there were over 200,000 current Windows 2000 Server MCSEs at the beginning of 2003, and an additional 1.2 million MCP looking to become MCSEs. Syngress has launched a complete line of MCSE 2003 Study Guide/DVD Training Systems(Core 4 plus 3 most popular electives) to publish simultaneously with the launch of the exams. While many industry analysts view the certification market as flat, the reality is that there has been a dramatic reduction in the number of certification series being published since MCSE 2000 and the handful of quality series left should all garner significant gains in market share. The Syngress series was formally published by McGraw-Hill, and the core titles averaged over 40,000 units in retail sales while the electives averaged over 15,000 units each. Through aggressive promotion to our over 70,000 registered users of MCSE 2000 books, strong representation in the retail channel, and the inclusion of a DVD, this comprehensive and...
  • Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker. MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214)
    MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network. Study Guide and DVD Training System (Exam 70-214)
    Will Schmied, Thomas W. Shinder, Robert J. Shimonski, Tony Piltzecker
    Syngress knows what passing the exam means to you and to your career. And we know that you are often financing your own training and certification; therefore, you need a system that is comprehensive, affordable, and effective. Boasting one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation, the Syngress Study Guide & DVD Training System guarantees 100% coverage of exam objectives. The Syngress Study Guide & DVD Training System includes: - Study Guide with 100% coverage of exam objectives by reading this study guide and following the corresponding objective list, you can be sure that you have studied 100% of the exam objectives. - Instructor-led DVD this DVD provides almost two hours of virtual classroom instruction. - Web-based practice exams Just visit us at www.syngress.com/ certification to access a complete exam simulation. Thank you for giving us the opportunity to serve your certification needs. And be sure...
  • Jan De Clercq. Microsoft Windows Security Fundamentals
    Microsoft Windows Security Fundamentals
    Jan De Clercq
    Microsoft Windows Security Fundamentals
  • Доминик Байер. Microsoft ASP .NET. Обеспечение безопасности
    Microsoft ASP .NET. Обеспечение безопасности
    Доминик Байер
    Эта книга - подробное руководство для программистов, которые используют Microsoft ASP .NET 2.0 и заинтересованы в обеспечении безопасности разрабатываемых приложений. В ней подробно рассказывается о способах внедрения в приложения превентивных мер защиты, в частности подтверждения ввода данных, аутентификации и авторизации. Рассмотрены методы обнаружения и обработки ошибок, ограничение функциональности с помощью частичного доверия, применение провайдеров защиты. Отдельная глава посвящена описанию инструментов, которые можно использовать для тестирования и улучшения защиты приложений. Книга адресована профессионалам, а также всем, кто занимается защитой приложений.
  • James D. Burton, Anton Chuvakin, Anatoly Elberg, Brian Freedman, David King, Scott Paladino, Paul Schooping. PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
    PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
    James D. Burton, Anton Chuvakin, Anatoly Elberg, Brian Freedman, David King, Scott Paladino, Paul Schooping
    Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the information that you need to understand the PCI Data Security standards and how to effectively implement security on the network infrastructure in order to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information.
  • Thomas Porter, Jan Kanclirz Jr.. Practical VoIP Security
    Practical VoIP Security
    Thomas Porter, Jan Kanclirz Jr.
    Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions. VoIP Isn't Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. ...
  • Dave Tyson. Security Convergence: Managing Enterprise Security Risk
    Security Convergence: Managing Enterprise Security Risk
    Dave Tyson
    Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency, greatly improves security, and saves companies money. Implementation of convergence principles has increased rapidly and the number of businesses moving to this model will continue to grow over the next few years. All security professionals, regardless of background, will find this a useful reference and a practical look at the benefits of convergence and a look to the future of how...
  • Jack Wiles. Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
    Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
    Jack Wiles
    This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference, to which this book is linked, has increased in size by almost 50% in its second year; another example of the rapid growth in the digital forensics world. The "TechnoSecurity Guide to Digital Forensics and E-Discovery" features: Internationally known experts in computer forensics share their years of experience at the...
  • The Internet WatchDog Version 2.0 Windows
    The Internet WatchDog Version 2.0 Windows
    This network version of the popular Internet WatchDog allows the employer to monitor and record all computer activity -- (even OFF the Internet) by taking random screen captures, logging all computer applications, and recording downloaded graphics. WatchDog prints reports of all activity and will view multiple clients from one machine. Whereas "blocking" software must be updated daily and is relatively useless against video game applications, Internet WatchDog provides the employer with a complete record of the computer user's activity. Includes the Intranet Construction Kit CD and Microsoft Internet Explorer 4.0! Plus it prints reports and enables authorized user to view the activity of several clients. Unlimited users license and free technical support. Runs on Windows 95 and Windows NT machines.
  • Jan De Clercq, JAN DE CLERCQ. Windows Server 2003 Security Infrastructures : Core Security Features
    Windows Server 2003 Security Infrastructures : Core Security Features
    Jan De Clercq, JAN DE CLERCQ
    Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server 2003 security *Provides practical insights into how to deploy and administer secure Windows Server 2003 infrastructures *Draws on the experience of a lead consultant in the Microsoft security area
  • А.В. Бабаш, Е.К. Баранова. Актуальные вопросы защиты информации.
    Актуальные вопросы защиты информации.
    А.В. Бабаш, Е.К. Баранова
    Монография посвящена рассмотрению избранных аспектов современной защиты информации, в частности анализу, оценке, обработке рисков и управлению инцидентами информационной безопасности в соответствии с линейкой стандартов ISO/IEC 27000, а также криптографическим и теоретико-автоматным аспектам современной защиты информации. Представленные материалы будут полезны бакалаврам и магистрантам высших учебных заведений, изучающим курсы «Информационная безопасность» и «Управление информационной безопасностью», а также аспирантам и специалистам, интересующимся вопросами защиты информации.
  • Д. Колисниченко. Безопасный Android. Защищаем свои деньги и данные от кражи
    Безопасный Android. Защищаем свои деньги и данные от кражи
    Д. Колисниченко
    Рассмотрены различные способы обеспечения безопасности Android-устройств: шифрование персональной информации, хранящейся на устройстве, шифрование передаваемых данных, VPN-соединения, анонимизация трафика, выбор и использование антивируса и брандмауэра, поиск потерянного или украденного устройства, экономия трафика, защита от спама, получение прав root. Уделено внимание вопросам личной и семейной безопасности (ограничение доступа ребенка к определенным ресурсам/программам, отслеживание телефона ребенка и т. д.). Практически все рассмотренное в книге программное обеспечение бесплатное, что поможет не только защитить ваше устройство, но и сэкономить деньги.
  • А. Ю. Даниленко. Безопасность систем электронного документооборота. Технология защиты электронных документов
    Безопасность систем электронного документооборота. Технология защиты электронных документов
    А. Ю. Даниленко
    Всякий раз, когда заходит разговор об обмене информацией в электронной форме, будь это платежи через Интернет, почта или переписка в Скайпе, рано или поздно возникает тема безопасности информации. Если же мы говорим об электронном документообороте, то есть о движении электронных документов, совместной работе с ними, принятии решений на их основе, набор вопросов существенно возрастает. Например: Что такое юридическая значимость электронного документа и как ее обеспечить? Как обеспечить конфиденциальность информации? Можно ли быть уверенными в неизменности данных, содержащихся в нашем документе, если мы сами их не модифицировали? Имеет ли смысл шифровать электронные документы, и если да, то как это делать? Какова роль электронных подписей при работе с такими системами? Можем ли мы доверять данной информационной системе свою информацию, а если можем, то почему? И вообще, что такое электронный документ? ...
  • А. Ю. Даниленко. Безопасность систем электронного документооборота. Технология защиты электронных документов
    Безопасность систем электронного документооборота. Технология защиты электронных документов
    А. Ю. Даниленко
    Всякий раз, когда заходит разговор об обмене информацией в электронной форме, будь это платежи через Интернет, почта или переписка в Скайпе, рано или поздно возникает тема безопасности информации. Если же мы говорим об электронном документообороте, то есть о движении электронных документов, совместной работе с ними, принятии решений на их основе, набор вопросов существенно возрастает. Например: Что такое юридическая значимость электронного документа и как ее обеспечить? Как обеспечить конфиденциальность информации? Можно ли быть уверенными в неизменности данных, содержащихся в нашем документе, если мы сами их не модифицировали? Имеет ли смысл шифровать электронные документы, и если да, то как это делать? Какова роль электронных подписей при работе с такими системами? Можем ли мы доверять данной информационной системе свою информацию, а если можем, то почему? И вообще, что такое электронный документ? ...

© 2017 books.iqbuy.ru