Hacking - ebooki, książki online
Książki, ebooki, audiobooki, kursy video z kategorii: Hacking dostępne w księgarni Ebookpoint
-
Promocja
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu-
-
ebook
92 pkt
(29,90 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł (-15%) -
-
Promocja
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX pl-
-
ebook
186 pkt
(29,90 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł (-15%) -
-
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is-
-
ebook
80 pkt
(29,90 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł (-15%) -
-
Promocja
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Be-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn-
-
ebook
118 pkt
(29,90 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
-
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence-
-
ebook
80 pkt
(29,90 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł (-15%) -
-
Promocja
-
-
ebook
107 pkt
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
-
-
ebook
107 pkt
(39,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
-
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
-
-
ebook
170 pkt
(39,90 zł najniższa cena z 30 dni)
170.10 zł
189.00 zł (-10%) -
-
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee-
-
ebook
143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u-
-
ebook
160 pkt
(29,90 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł (-15%) -
-
Promocja
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of special-
-
ebook
143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t-
-
ebook
67 pkt
(29,90 zł najniższa cena z 30 dni)
67.92 zł
79.90 zł (-15%) -
-
Promocja
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F-
-
ebook
118 pkt
(29,90 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
-
Promocja
Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets-
-
ebook
80 pkt
(29,90 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł (-15%) -
-
Promocja
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.But there is a growing recognition-
-
ebook
135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every-
-
ebook
118 pkt
(29,90 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
-
Promocja
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a f-
-
ebook
92 pkt
(29,90 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł (-15%) -
-
Promocja
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b-
-
ebook
118 pkt
(29,90 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
-
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ-
-
ebook
143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those-
-
ebook
135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each-
-
ebook
92 pkt
(29,90 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł (-15%) -
-
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the-
-
ebook
118 pkt
(29,90 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
-
Promocja
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be-
-
ebook
203 pkt
(29,90 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e-
-
ebook
135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensiv-
-
ebook
143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh-
-
ebook
92 pkt
(29,90 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł (-15%) -
-
Promocja
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption fo-
-
ebook
109 pkt
(29,90 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
-
Promocja
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that-
-
ebook
135 pkt
(29,90 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
-
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t-
-
ebook
143 pkt
(29,90 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
-
Promocja
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig-
-
ebook
46 pkt
(29,90 zł najniższa cena z 30 dni)
46.74 zł
54.99 zł (-15%) -
-
Oto druga część wyczerpującego przewodnika po praktycznych zastosowaniach kryptografii oraz mechanizmach bezpieczeństwa pozwalających na skuteczną ochronę informacji, sieci i systemów komputerowych. Znajdziesz tu m.in. opis sprawdzonych metod zarządzania kluczami, a ponadto najpopularniejsze techniki uwierzytelniania użytkowników. Poczytasz o algor-
książka
79 pkt
Czasowo niedostępna
-
-
Przeczytasz m.in na temat trybów operacyjnych szyfrów blokowych, przyjrzysz się także standardowi AES i generowaniu liczb pseudolosowych. Otrzymasz obszerną, porównawczą prezentację algorytmów kryptograficznych i doskonały przewodnik po metodach uwierzytelniania i tematyce cyfrowego podpisu. Ponadto nauczysz się efektywnie wykorzystywać system Sag-
książka
99 pkt
Czasowo niedostępna
-
-
Autor na praktycznych przykładach udowadnia skuteczność zastosowanych technologii, które są porównywalne z komercyjnymi, i pokazuje sposoby ich wykorzystywania. Dołączone do książki skrypty umożliwiają przetestowanie omawianych technologii w praktyce.-
książka
69 pkt
Czasowo niedostępna
-
-
"Teoria zabezpieczeń systemów komputerowych" to przegląd podstawowych pojęć związanych z bezpieczeństwem komputera i sieci komputerowej. Książka została napisana w oparciu o wykłady dotyczące zabezpieczeń systemów komputerowych, prowadzone na Uniwersytecie w Wollongong w Australii.-
książka
129 pkt
Czasowo niedostępna
-
-
Każdy twój ruch w sieci jest monitorowany i zapisywany, a twoja prywatność nieustannie zagrożona. Potężne korporacje oraz rządy chcą wiedzieć, co robisz, i odpowiednio to wykorzystać. Prywatność to dziś luksus, na który niewielu z nas może sobie pozwolić.-
książka
44 pkt
Czasowo niedostępna
-

