Bezpieczeństwo sieci - ebooki
Ebooki z kategorii: Bezpieczeństwo sieci dostępne w księgarni Helion
-
Promocja
Promocja 2za1
Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can d- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Promocja 2za1
The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopte- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Promocja 2za1
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every- ePub + Mobi pkt
SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition SSH, The Secure Shell: The Definitive Guide. The Definitive Guide. 2nd Edition
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
Promocja 2za1
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a f- ePub + Mobi pkt
Network Security Tools. Writing, Hacking, and Modifying Security Tools Network Security Tools. Writing, Hacking, and Modifying Security Tools
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Promocja 2za1
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--b- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
Promocja 2za1
FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administ- ePub + Mobi pkt
Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems Mastering FreeBSD and OpenBSD Security. Building, Securing, and Maintaining BSD Systems
(152,15 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Promocja
Promocja 2za1
The core idea behind Real World Web Services is simple: after years of hype, what are the major players really doing with web services? Standard bodies may wrangle and platform vendors may preach, but at the end of the day what are the technologies that are actually in use, and how can developers incorporate them into their own applications? Those- ePub + Mobi pkt
Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more Real World Web Services. Integrating EBay, Google, Amazon, FedEx and more
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Promocja 2za1
Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.De- ePub + Mobi pkt
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Promocja 2za1
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of systems used by hackers in the wild is a formidable task, and scrambling to patch each- ePub + Mobi pkt
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Promocja 2za1
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the- ePub + Mobi pkt
(126,65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Promocja
Promocja 2za1
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users wh- ePub + Mobi pkt
RADIUS. Securing Public Access to Private Resources RADIUS. Securing Public Access to Private Resources
(101,15 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Promocja
Promocja 2za1
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption fo- ePub + Mobi pkt
Network Security with OpenSSL. Cryptography for Secure Communications Network Security with OpenSSL. Cryptography for Secure Communications
(118,15 zł najniższa cena z 30 dni)
118.15 zł
139.00 zł(-15%) -
Promocja
Promocja 2za1
Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that- ePub + Mobi pkt
(143,65 zł najniższa cena z 30 dni)
143.65 zł
169.00 zł(-15%) -
Promocja
Promocja 2za1
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rig- ePub + Mobi pkt
Database Nation. The Death of Privacy in the 21st Century Database Nation. The Death of Privacy in the 21st Century
(50,91 zł najniższa cena z 30 dni)
50.91 zł
59.90 zł(-15%) -
Promocja
Promocja 2za1
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and person- ePub + Mobi pkt
(169,14 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%)