Bezpieczeństwo systemów
Książki, ebooki, audiobooki, kursy video z kategorii: Bezpieczeństwo systemów dostępne w księgarni Ebookpoint
-
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi 92 pkt
(56,94 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł (-15%) -
Promocja
- PDF + ePub + Mobi 107 pkt
(29,90 zł najniższa cena z 30 dni)
107.10 zł
119.00 zł (-10%) -
Promocja
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad- ePub + Mobi 118 pkt
(77,42 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi 160 pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
199.00 zł (-19%) -
Promocja
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, u- ePub + Mobi 177 pkt
(121,42 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł (-15%) -
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t- ePub + Mobi 76 pkt
(72,24 zł najniższa cena z 30 dni)
76.42 zł
89.90 zł (-15%) -
Promocja
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. F- ePub + Mobi 135 pkt
(88,81 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d- ePub + Mobi 118 pkt
(81,10 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
Promocja
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.But there is a growing recognition- ePub + Mobi 152 pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
Promocja
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte- ePub + Mobi 109 pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
Promocja
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every- ePub + Mobi 135 pkt
(89,53 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
Promocja
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b- ePub + Mobi 126 pkt
(83,12 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł (-15%) -
Promocja
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ- ePub + Mobi 160 pkt
(109,32 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł (-15%) -
Promocja
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those- ePub + Mobi 143 pkt
(95,48 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł (-15%) -
Promocja
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De- ePub + Mobi 118 pkt
(77,89 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the- ePub + Mobi 135 pkt
(89,27 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł (-15%) -
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e- ePub + Mobi 152 pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
Promocja
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject- ePub + Mobi 118 pkt
(79,73 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł (-15%) -
Promocja
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensiv- ePub + Mobi 160 pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
199.00 zł (-19%) -
Promocja
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh- ePub + Mobi 109 pkt
(101,15 zł najniższa cena z 30 dni)
109.65 zł
129.00 zł (-15%) -
Promocja
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that- ePub + Mobi 152 pkt
(143,65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł (-15%) -
Promocja
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig- ePub + Mobi 55 pkt
(50,91 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł (-15%) -
Promocja
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi 177 pkt
(120,42 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł (-15%) -
Dzięki książce "Rootkity. Sabotowanie jądra systemu Windows" poznasz swojego przeciwnika i nauczysz się z nim walczyć, tworząc własny arsenał. Greg Hoglund i James Butler przedstawiają sposoby, z jakich korzystają hakerzy, aby włamywać się do komputerów i używać ich bez wiedzy właścicieli.
- Druk 79 pkt
Czasowo niedostępna