Télécharger le livre :  Software Safety and Security
Ajouter à ma liste d'envies
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol...

Editeur : SAGE Publications Ltd
Parution : 2012-05-15

PDF

117,27
Télécharger le livre :  Cyber Security Policy Guidebook
Ajouter à ma liste d'envies
Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on...

Editeur : Wiley
Parution : 2012-03-28

PDF, ePub

102,28
Télécharger le livre :  The Web Application Hacker's Handbook
Ajouter à ma liste d'envies
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users....

Editeur : Wiley
Parution : 2011-08-31

PDF, ePub

53,80
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and...

Editeur : Wiley
Parution : 2011-08-04

PDF, ePub

15,61
Télécharger le livre :  The Art of Deception
Ajouter à ma liste d'envies
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...

Editeur : Wiley
Parution : 2011-08-04

PDF, ePub

16,88
Télécharger le livre :  Microsoft Windows Security Essentials
Ajouter à ma liste d'envies
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand...

Editeur : Sybex
Parution : 2011-06-03

PDF, ePub

36,08
Télécharger le livre :  Computer Viruses For Dummies
Ajouter à ma liste d'envies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2011-05-09

PDF, ePub

17,30
Télécharger le livre :  Web Commerce Security
Ajouter à ma liste d'envies
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...

Editeur : Wiley
Parution : 2011-05-04

PDF, ePub

54,12
Télécharger le livre :  IP Address Management
Ajouter à ma liste d'envies
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...

Editeur : Wiley-IEEE Press
Parution : 2011-04-20
Collection : IEEE Press Series on Network and Service Management
ePub

137,10
Télécharger le livre :  Network Security Bible
Ajouter à ma liste d'envies
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the...

Editeur : Wiley
Parution : 2011-03-31
Collection : Bible
PDF, ePub

54,12
Télécharger le livre :  Secrets and Lies
Ajouter à ma liste d'envies
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Editeur : Wiley
Parution : 2011-03-25

PDF, ePub

27,43
Télécharger le livre :  The Shellcoder's Handbook
Ajouter à ma liste d'envies
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that...

Editeur : Wiley
Parution : 2011-02-16

PDF, ePub

49,58
Télécharger le livre :  Cryptography Engineering
Ajouter à ma liste d'envies
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...

Editeur : Wiley
Parution : 2011-02-02

PDF, ePub

51,70
Télécharger le livre :  Implementing SSL / TLS Using Cryptography and PKI
Ajouter à ma liste d'envies
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS),...

Editeur : Wiley
Parution : 2011-01-07

PDF, ePub

56,97
Télécharger le livre :  Malware Analyst's Cookbook and DVD
Ajouter à ma liste d'envies
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses,...

Editeur : Wiley
Parution : 2010-10-01

PDF, ePub

54,12
Télécharger le livre :  Cloud Security
Ajouter à ma liste d'envies
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital...

Editeur : Wiley
Parution : 2010-08-31

ePub

48,00
Télécharger le livre :  Privacy and Anonymity in Information Management Systems
Ajouter à ma liste d'envies
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...

Editeur : Springer
Parution : 2010-07-16
Collection : Advanced Information and Knowledge Processing
ePub

147,69
Télécharger le livre :  Security in a Web 2.0+ World
Ajouter à ma liste d'envies
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know...

Editeur : Wiley
Parution : 2010-04-27

PDF, ePub

37,98
Télécharger le livre :  Unauthorised Access
Ajouter à ma liste d'envies
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT...

Editeur : Wiley
Parution : 2010-03-25

PDF, ePub

37,98
Télécharger le livre :  Information Security Governance
Ajouter à ma liste d'envies
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...

Editeur : Wiley
Parution : 2009-04-14
Collection : Wiley Series in Systems Engineering and Management
PDF, ePub

107,56
<< < 1112131415 >