|
Next generation SSH2 implementation
|
Dale Liu |
The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… |
OL13614374W |
|
CCSP
|
Todd Lammle |
Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides: In-depth coverage of every SECUR exam objective Practical information on Cisc… |
OL15068518W |
|
Securing E-Business Applications and Communications
|
Jonathan S Held |
Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… |
OL15183796W |
|
Active Defense
|
Chris Brenton |
Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… |
OL15188346W |
|
AAA and Network Security for Mobile Access
|
Madjid Nakhjiri |
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill fo… |
OL15191011W |
|
Nortel Guide to VPN Routing for Security and VoIP
|
James Edwards |
Here's your handbook to Nortel VPN Router If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN … |
OL15191800W |
|
Engineering information security
|
Stuart Jacobs |
"Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … |
OL15455552W |
|
Computer-mediated communication across cultures
|
Kirk St. Amant,Sigrid Kelsey |
"This book provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media"--Provided by publisher. |
OL15951908W |
|
Privacy, intrusion detection, and response
|
Peyman Kabiri |
" This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy… |
OL15951909W |
|
Penetration tester's open source toolkit
|
Jeremy Faircloth |
"Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… |
OL15981093W |
|
Metasploit
|
David Kennedy |
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… |
OL15991444W |
|
Digital identity and access management
|
Raj Sharman,Sanjukta Das Smith,Manish Gupta |
"This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with … |
OL16142915W |
|
Principles of information security
|
Michael E. Whitman |
The fourth edition of Principles of Information Security continues to explore the field of information security and assurance with updated content on new innovations in technology and methodologies. … |
OL16262659W |
|
Handbook on soft computing for video surveillance
|
Sankar K. Pal,Alfredo Petrosino,Lucia Maddalena |
"Preface Video surveillance is the area of computer science devoted to real-time acquisition, processing, and management of videos coming from cameras installed in public and private areas, in order … |
OL16451144W |
|
Wireless Network Administration
|
Wale Soyinka |
Learn the essentials of wireless networking. Configure, manage, and secure wireless networks using the step-by-step details in this practical resource. Wireless Network Administration: A Beginner's G… |
OL16466885W |
|
CISA
|
David L. Cannon |
"The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as th… |
OL16516868W |
|
Netcat power tools
|
Brian Baskin |
Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" too… |
OL16919635W |
|
Guide to Computer Network Security
|
Joseph Migga Kizza |
<p>With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before.</p><p>This comprehensive … |
OL19854070W |
|
Hiding in Plain Sight
|
Eric Cole |
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hide… |
OL19855216W |
|
Quality, Reliability, Security and Robustness in Heterogeneous Networks
|
Karan Singh |
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 201… |
OL19898076W |