Books

20+ results found
Title Authors Description OpenBook ID
Next generation SSH2 implementation Next generation SSH2 implementation Dale Liu The most up-to-date information on the next generation of SSH2 and how to incorporate it into your organization's security environment New security risks, continuously evolving regulation and increas… OL13614374W
CCSP CCSP Todd Lammle Here's the book you need to prepare for Exam 642-501, Securing Cisco IOS Networks (SECUR). This Study Guide provides: In-depth coverage of every SECUR exam objective Practical information on Cisc… OL15068518W
Securing E-Business Applications and Communications Securing E-Business Applications and Communications Jonathan S Held Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundam… OL15183796W
Active Defense Active Defense Chris Brenton Active Defense is our new comprehensive guide to implementing effective network security using the latest technologies. Superb coverage of all security threats (internal and external) and ways to… OL15188346W
AAA and Network Security for Mobile Access AAA and Network Security for Mobile Access Madjid Nakhjiri AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill fo… OL15191011W
Nortel Guide to VPN Routing for Security and VoIP Nortel Guide to VPN Routing for Security and VoIP James Edwards Here's your handbook to Nortel VPN Router If you're a beginning-to-intermediate-level networking professional, this guide lays the groundwork you need to establish and manage your network with VPN … OL15191800W
Engineering information security Engineering information security Stuart Jacobs "Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed … OL15455552W
Computer-mediated communication across cultures Computer-mediated communication across cultures Kirk St. Amant,Sigrid Kelsey "This book provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media"--Provided by publisher. OL15951908W
Privacy, intrusion detection, and response Privacy, intrusion detection, and response Peyman Kabiri " This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy… OL15951909W
Penetration tester's open source toolkit Penetration tester's open source toolkit Jeremy Faircloth "Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing p… OL15981093W
Metasploit Metasploit David Kennedy "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is… OL15991444W
Digital identity and access management Digital identity and access management Raj Sharman,Sanjukta Das Smith,Manish Gupta "This book explores important and emerging advancements in digital identity and access management systems, providing innovative answers to an assortment of problems as system managers are faced with … OL16142915W
Principles of information security Principles of information security Michael E. Whitman The fourth edition of Principles of Information Security continues to explore the field of information security and assurance with updated content on new innovations in technology and methodologies. … OL16262659W
Handbook on soft computing for video surveillance Handbook on soft computing for video surveillance Sankar K. Pal,Alfredo Petrosino,Lucia Maddalena "Preface Video surveillance is the area of computer science devoted to real-time acquisition, processing, and management of videos coming from cameras installed in public and private areas, in order … OL16451144W
Wireless Network Administration Wireless Network Administration Wale Soyinka Learn the essentials of wireless networking. Configure, manage, and secure wireless networks using the step-by-step details in this practical resource. Wireless Network Administration: A Beginner's G… OL16466885W
CISA CISA David L. Cannon "The industry-leading study guide for the CISA exam, fully updated More than 27,000 IT professionals take the Certified Information Systems Auditor exam each year. SC Magazine lists the CISA as th… OL16516868W
Netcat power tools Netcat power tools Brian Baskin Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" too… OL16919635W
Guide to Computer Network Security Guide to Computer Network Security Joseph Migga Kizza <p>With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before.</p><p>This comprehensive … OL19854070W
Hiding in Plain Sight Hiding in Plain Sight Eric Cole These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hide… OL19855216W
Quality, Reliability, Security and Robustness in Heterogeneous Networks Quality, Reliability, Security and Robustness in Heterogeneous Networks Karan Singh This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 201… OL19898076W
Next page