|
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...
Editeur :
Wiley
Parution :
2011-05-04
PDF, ePub
|
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...
Editeur :
Wiley-IEEE Press
Parution :
2011-04-20
Collection :
IEEE Press Series on Networks and Service Management
ePub
|
The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the newest developments. If you are responsible for network security, this is the...
Editeur :
Wiley
Parution :
2011-03-31
Collection :
Bible
PDF, ePub
|
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...
Editeur :
Wiley
Parution :
2011-03-25
PDF, ePub
|
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned...
Editeur :
Wiley
Parution :
2011-02-02
PDF, ePub
|
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS),...
Editeur :
Wiley
Parution :
2011-01-11
PDF, ePub
|
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses,...
Editeur :
Wiley
Parution :
2010-10-01
PDF, ePub
|
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital...
Editeur :
Wiley
Parution :
2010-08-31
ePub
|
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...
Editeur :
Springer
Parution :
2010-07-16
Collection :
Advanced Information and Knowledge Processing
ePub
|
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know...
Editeur :
Wiley
Parution :
2010-04-27
PDF, ePub
|
The first guide to planning and performing a physical penetration test on your computer's security Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT...
Editeur :
Wiley
Parution :
2010-03-25
PDF, ePub
|
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...
Editeur :
Wiley
Parution :
2009-04-14
Collection :
Wiley Series in Systems Engineering and Management
PDF, ePub
|
Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...
Editeur :
Wiley
Parution :
2009-04-08
PDF
|
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...
Editeur :
Wiley
Parution :
2009-03-17
PDF, ePub
|
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...
Editeur :
Wiley
Parution :
2009-03-16
PDF, ePub
|
Data leaks expose your customers to identity theft and yourbusiness to security risks. But how do you set up a data lossprevention plan? Start withData Leaks For Dummies! Now more than ever, it’s critical to keep your companydata locked up tighter than Fort Knox....
Editeur :
For Dummies
Parution :
2009-03-11
ePub
|
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans...
Editeur :
Wiley
Parution :
2009-01-26
PDF
|
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the...
Editeur :
For Dummies
Parution :
2008-10-10
PDF, ePub
|
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and...
Editeur :
Wiley
Parution :
2008-09-22
PDF
|
The human element is the principle cause of incidents and accidents in all technology industries; hence it is evident that an understanding of the interaction between humans and technology is crucial to the effective management of risk. Despite this, no tested model...
Editeur :
Wiley
Parution :
2008-09-15
PDF
|