Hacking - ebooki
Ebooki z kategorii: Hacking dostępne w księgarni Helion
-
Promocja
Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and practical solutions that you can implement right away.Id- ePub + Mobi pkt
(80,73 zł najniższa cena z 30 dni)
80.73 zł
94.99 zł(-15%) -
- PDF + ePub + Mobi pkt
Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set Windows Malware Analysis Essentials. Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
-
- PDF + ePub + Mobi pkt
Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 Learning zANTI2 for Android Pentesting. Dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution Kali Linux Wireless Penetration Testing Essentials. Plan and execute penetration tests on wireless networks with the Kali Linux distribution
-
- PDF + ePub + Mobi pkt
Wireshark Network Security. A succinct guide to securely administer your network using Wireshark Wireshark Network Security. A succinct guide to securely administer your network using Wireshark
-
Promocja
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Google’s BigTable data storage system. Written by former NSA team members, this comprehensive tutorial and reference covers Accumulo architecture, application development, table design, and cell-level s- ePub + Mobi pkt
Accumulo. Application Development, Table Design, and Best Practices Accumulo. Application Development, Table Design, and Best Practices
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Learn the data skills necessary for turning large sequencing datasets into reproducible and robust biological findings. With this practical guide, you’ll learn how to use freely available open source tools to extract meaning from large complex biological data sets.At no other point in human history has our ability to understand life’s c- ePub + Mobi pkt
Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools Bioinformatics Data Skills. Reproducible and Robust Research with Open Source Tools
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance Zabbix Performance Tuning. Tune and optimize Zabbix to maximize performance
-
Promocja
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to cor- ePub + Mobi pkt
Hadoop Security. Protecting Your Big Data Platform Hadoop Security. Protecting Your Big Data Platform
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing Python Web Penetration Testing Cookbook. Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
Benjamin May, Cameron Buchanan, Andrew Mabbitt, Dave Mound, Terry Ip
-
- PDF + ePub + Mobi pkt
Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks Nmap Essentials. Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
-
Promocja
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own th- ePub + Mobi pkt
Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan Crafting the InfoSec Playbook. Security Monitoring and Incident Response Master Plan
(152,15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services Microsoft Azure Security. Protect your solutions from malicious users using Microsoft Azure Services
-
- PDF + ePub + Mobi pkt
Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux Kali Linux Wireless Penetration Testing: Beginner's Guide. Master wireless testing techniques to survey and attack wireless networks with Kali Linux
-
- PDF + ePub + Mobi pkt
Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet Learning Puppet Security. Secure your IT environments with the powerful security tools of Puppet
-
- PDF + ePub + Mobi pkt
Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools Getting Started with Windows Server Security. Develop and implement a secure Microsoft infrastructure platform using native and built-in tools
-
- PDF + ePub + Mobi pkt
Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques Learning iOS Security. Enhance the security of your iOS platform and applications using iOS-centric security techniques
-
- PDF + ePub + Mobi pkt
Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems Exploring SE for Android. Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
-
- PDF + Mobi pkt
Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts Mastering the Nmap Scripting Engine. Master the Nmap Scripting Engine and the art of developing NSE scripts
-
- PDF + ePub + Mobi pkt
Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting Python Penetration Testing Essentials. Employ the power of Python to get the best out of pentesting
-
- PDF + ePub + Mobi pkt
Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi Penetration Testing with Raspberry Pi. Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi
-
- PDF + ePub + Mobi pkt
JavaScript Security. Learn JavaScript security to make your web applications more secure JavaScript Security. Learn JavaScript security to make your web applications more secure
-
- PDF + ePub + Mobi pkt
Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW Untangle Network Security. Secure your network against threats and vulnerabilities using the unparalleled Untangle NGFW
-
- PDF + ePub + Mobi pkt
Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively Wireshark Essentials. Get up and running with Wireshark to analyze network packets and protocols effectively
-
Cyfrowy świat już nieodwołalnie wkroczył w nasze życie, lecz czy przyniósł same korzyści? Wydawało się, że wraz z rozwojem Internetu będzie się poszerzać sfera wolności, lecz stało się coś wręcz przeciwnego. Ujawniona przez Edwarda Snowdena skala powszechnego szpiegostwa z wykorzystaniem globalnej sieci Internet wskazuje, że wolności jest co
-
- PDF + ePub + Mobi pkt
Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning Kali Linux Network Scanning Cookbook. Over 90 hands-on recipes explaining how to leverage custom scripts, and integrated tools in Kali Linux to effectively master network scanning
-
- PDF + ePub + Mobi pkt
Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux Kali Linux CTF Blueprints. Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
-
- PDF + ePub + Mobi pkt
Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual Mastering Kali Linux for Advanced Penetration Testing. This book will make you an expert in Kali Linux penetration testing. It covers all the most advanced tools and techniques to reproduce the methods used by sophisticated hackers. Full of real-world examples – an indispensable manual
-
- PDF + ePub + Mobi pkt
Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually Building Virtual Pentesting Labs for Advanced Penetration Testing. Build intricate virtual architecture to practice any penetration testing technique virtually
-
Co to jest nowy malware i czy jest się czego bać? Cyfrowy świat już na dobre wkroczył w nasze życie, lecz czy na pewno przyniósł same dobrodziejstwa? Wielu z nas tak zauroczyło się tym cyfrowym jarmarkiem różności, że się nad tym nie zastanawia... Zagrożenia w wirtualnym świecie są bagatelizowane, a nawet świadomie ignorowane &nda
-
- PDF + ePub + Mobi pkt
Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert Mastering Metasploit. With this tutorial you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert
-
- PDF + ePub + Mobi pkt
Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools Penetration Testing with the Bash shell. Make the most of Bash shell and Kali Linux’s command line based security assessment tools
-
- PDF + ePub + Mobi pkt
Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals Kali Linux - Assuring Security by Penetration Testing. With Kali Linux you can test the vulnerabilities of your network and then take steps to secure it. This engaging tutorial is a comprehensive guide to this penetration testing platform, specially written for IT security professionals
-
- PDF + ePub + Mobi pkt
Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox Penetration Testing with BackBox. This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox
-
- PDF + ePub + Mobi pkt
Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Android Security Cookbook. Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Keith Makan, Scott Alexander-Bown, Keith Harald Esrick Makan
-
- PDF + ePub + Mobi pkt
Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues Network Analysis using Wireshark Cookbook. This book will be a massive ally in troubleshooting your network using Wireshark, the world's most popular analyzer. Over 100 practical recipes provide a focus on real-life situations, helping you resolve your own individual issues
-
- PDF + ePub + Mobi pkt
Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress Building a Home Security System with BeagleBone. Save money and pursue your computing passion with this guide to building a sophisticated home security system using BeagleBone. From a basic alarm system to fingerprint scanners, all you need to turn your home into a fortress
-
- PDF + ePub + Mobi pkt
Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning Monitoring with Opsview. Once you've learnt Opsview monitoring, you can keep watch over your whole IT environment, whether physical, virtual, or private cloud. This book is the perfect introduction, featuring lots of screenshots and examples for fast learning
-
- PDF + ePub + Mobi pkt
Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques Instant Java Password and Authentication Security. A practical, hands-on guide to securing Java application passwords with hashing techniques
-
- PDF + ePub + Mobi pkt
Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes Implementing AppFog. Getting to grips with the AppFog service is easily achieved with this hands-on guide, which walks you through creating and deploying applications to the cloud. You'll be developing your first application in minutes
-
- PDF + ePub + Mobi pkt
VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud VMware vCloud Security. If you're familiar with Vmware vCloud, this is the book you need to take your security capabilities to the ultimate level. With a comprehensive, problem-solving approach it will help you create a fully protected private cloud
-
- PDF + ePub + Mobi pkt
Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox Cuckoo Malware Analysis. Analyze malware using Cuckoo Sandbox
-
- PDF + ePub + Mobi pkt
Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes Kali Linux Cookbook. When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes
-
- PDF + ePub + Mobi pkt
Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment Microsoft DirectAccess Best Practices and Troubleshooting. Secure and efficient functioning of your DirectAccess environment
-
- PDF + ePub + Mobi pkt
SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features SELinux System Administration. With a command of SELinux you can enjoy watertight security on your Linux servers. This guide shows you how through examples taken from real-life situations, giving you a good grounding in all the available features
-
- PDF + ePub + Mobi pkt
Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens Mobile Security: How to Secure, Privatize, and Recover Your Devices. Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens
Darla Nykamp, Joseph Anderson, Jayasree Nampalli, Mari Heiser, Timothy Speed
-
- PDF + ePub + Mobi pkt
Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments Android Application Security Essentials. Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments
-
- PDF + ePub + Mobi pkt
Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness Instant OSSEC Host-based Intrusion Detection System. A hands-on guide exploring OSSEC HIDS for operational and security awareness
-
- PDF + ePub + Mobi pkt
VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced VMware View Security Essentials. The vital elements of securing your View environment are the subject of this user-friendly guide. From a theoretical overview to practical instructions, it's the ideal tutorial for beginners and an essential reference source for the more experienced
-
- PDF + ePub + Mobi pkt
BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide BackTrack - Testing Wireless Network Security. Secure your wireless networks against attacks, hacks, and intruders with this step-by-step guide
-
- PDF + ePub + Mobi pkt
Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website Instant CloudFlare Starter. A practical guide for using CloudFlare to effectively secure and speed up your website
-
Ochrona danych osobowych. Poradnik dla przedsiębiorców Ochrona danych osobowych. Poradnik dla przedsiębiorców
-
- PDF + ePub + Mobi pkt
Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents Instant Traffic Analysis with Tshark How-to. Master the terminal-based version of Wireshark for dealing with network security incidents
-
- PDF + ePub + Mobi pkt
SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM SolarWinds Orion Network Performance Monitor. An essential guide for installing, implementing, and calibrating SolarWinds Orion NPM
-
- PDF + ePub + Mobi pkt
Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments Instant Apple Configurator How-to. Gain full control and complete security when managing mobile iOS devices in mass deployments
-
- PDF + ePub + Mobi pkt
Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise Enterprise Security: A Data-Centric Approach to Securing the Enterprise. A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
-
- PDF + ePub + Mobi pkt
Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices Instant Microsoft Forefront UAG Mobile Configuration Starter. Everything you need to get started with UAG and its features for mobile devices
-
- PDF + ePub + Mobi pkt
Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth Nmap 6: Network Exploration and Security Auditing Cookbook. Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it’s a comprehensive guide to penetration testing and network monitoring. Security in depth
-
- PDF + ePub + Mobi pkt
Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server Oracle 11g Anti-hacker's Cookbook. Make your Oracle database virtually impregnable to hackers using the knowledge in this book. With over 50 recipes, you’ll quickly learn protection methodologies that use industry certified techniques to secure the Oracle database server
-
- PDF + ePub + Mobi pkt
Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here Microsoft System Center 2012 Endpoint Protection Cookbook. Install and manage System Center Endpoint Protection with total professionalism thanks to the 30 recipes in this highly focused Cookbook. From common tasks to automated reporting features, all the crucial techniques are here
-
- PDF + ePub + Mobi pkt
Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting Microsoft Forefront Identity Manager 2010 R2 Handbook. This is the only reference you need to implement and manage Microsoft Forefront Identity Manager in your business. Takes you from design to configuration in logical steps, and even covers basic Certificate Management and troubleshooting
-
- PDF + ePub + Mobi pkt
Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide. Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and
-
- PDF + ePub + Mobi pkt
Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and Mastering Microsoft Forefront UAG 2010 Customization. Discover the secrets to extending and customizing Microsoft Forefront Unified Access Gateway with this book and
-
Promocja
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’- ePub + Mobi pkt
Application Security for the Android Platform. Processes, Permissions, and Other Safeguards Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
(50,91 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%) -
Promocja
Ready to take your IT skills to the healthcare industry? This concise book provides a candid assessment of the US healthcare system as it ramps up its use of electronic health records (EHRs) and other forms of IT to comply with the government’s Meaningful Use requirements. It’s a tremendous opportunity for tens of thousands of IT profes- ePub + Mobi pkt
Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use Hacking Healthcare. A Guide to Standards, Workflows, and Meaningful Use
(55,24 zł najniższa cena z 30 dni)
55.24 zł
64.99 zł(-15%) -
Promocja
Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been col- ePub + Mobi pkt
Privacy and Big Data. The Players, Regulators, and Stakeholders Privacy and Big Data. The Players, Regulators, and Stakeholders
(63,74 zł najniższa cena z 30 dni)
63.74 zł
74.99 zł(-15%) -
Promocja
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Ne- ePub + Mobi pkt
Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification Junos Security. A Guide to Junos for the SRX Services Gateways and Security Certification
(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secu- ePub + Mobi pkt
Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX pl- ePub + Mobi pkt
JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
(203,15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Promocja
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is- ePub + Mobi pkt
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
Promocja
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techn- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional and reliable web presence- ePub + Mobi pkt
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
(84,92 zł najniższa cena z 30 dni)
92.65 zł
109.00 zł(-15%) -
- PDF + ePub + Mobi pkt
Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems Learning Nagios 3.0. A comprehensive configuration guide to monitor and maintain your network and systems
-
- PDF + ePub + Mobi pkt
Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide Joomla! Web Security. Secure your Joomla! website from common security threats with this easy-to-use guide
-
- PDF + ePub + Mobi pkt
Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and Active Directory Disaster Recovery. Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and
-
Promocja
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and kee- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. It provides all the information you need to get ready for these exams, including the four new A+ exams -- the required Essentials exam and three elective exams that pertain to your area of special- ePub + Mobi pkt
A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference A+, Network+, Security+ Exams in a Nutshell. A Desktop Quick Reference
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. Readers will have all t- ePub + Mobi pkt
The Internet: The Missing Manual. The Missing Manual The Internet: The Missing Manual. The Missing Manual
(72,24 zł najniższa cena z 30 dni)
72.24 zł
84.99 zł(-15%) -
Promocja
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.But there is a growing recognition- ePub + Mobi pkt
Security and Usability. Designing Secure Systems that People Can Use Security and Usability. Designing Secure Systems that People Can Use
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those- ePub + Mobi pkt
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul GrahamWe are living in the computer age, in a world increasingly designed and engineered by computer programmers and soft- ePub + Mobi pkt
Hackers & Painters. Big Ideas from the Computer Age Hackers & Painters. Big Ideas from the Computer Age
(59,42 zł najniższa cena z 30 dni)
59.42 zł
69.90 zł(-15%) -
Promocja
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Promocja
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of e- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensiv- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is t- ePub + Mobi pkt
(160,65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Promocja
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig- ePub + Mobi pkt
Database Nation. The Death of Privacy in the 21st Century Database Nation. The Death of Privacy in the 21st Century
(50,91 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%)