Informatyka / Hacking
The Internet: The Missing Manual. The Missing Manual
Autor: J. D. Biersdorfer, David Pogue
The Internet is almost synonymous with change--that's one of its charms, and one of its headaches. You may think you know the Internet, but are you really up to speed on internet telephones, movie and TV downloading, blogging, gaming, online banking, dating, and photosharing? This utterly current book covers:Getting Online. ...
Computer Security Basics. 2nd Edition
Autor: Rick Lehtinen, G. T. Gangemi
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult. The new edition builds on the well-established principles developed in the original edition and thoroughly updates ...
The Myths of Security. What the Computer Security Industry Doesn't Want You to Know
Autor: John Viega
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confro ...
Building Internet Firewalls. 2nd Edition
Autor: Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect b ...
RADIUS. Securing Public Access to Private Resources
Autor: Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and acco ...
Database Nation. The Death of Privacy in the 21st Century
Autor: Simson Garfinkel
Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that e ...
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
Autor: Josiah Dykstra
If you...re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You...ll learn how to conduct scientific experiments on everyday tools and procedu ...
Creating a Web Site: The Missing Manual. The Missing Manual. 2nd Edition
Autor: Matthew MacDonald
Think you have to be a technical wizard to build a great web site? Think again. If you want to create an engaging web site, this thoroughly revised, completely updated edition of Creating a Web Site: The Missing Manual demystifies the process and provides tools, techniques, and expert guidance for developing a professional an ...
Autor: Stefan Brunner, Vik Davar, David Delcourt
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you ca ...
Hacking: The Next Generation. The Next Generation
Autor: Nitesh Dhanjani, Billy Rios, Brett Hardin
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation i ...