Network security books

10034 books were found.

Mainframe Basics for Security Professionals: Getting Started with RACF

Mainframe Basics for Security Professionals: Getting...

Author: Ori Pomerantz ,  Barbara Vander Weele
ISBN: 9780131738560
Format: Hardback
$145.17

Leverage Your Security Expertise in IBM® System z™ Mainframe Environments   For over 40 years, the IBM mainframe...  Read More >>

Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche

Internet-Security aus Software-Sicht: Grundlagen der...

Author: Walter Kriha ,  Roland Schmitz
ISBN: 9783540222231
Format: Hardback
$52.67

Ziel der Autoren ist es, bei Entwicklern und Projektleitern ein grundlegendes Sicherheitsbewusstsein zu schaffen...  Read More >>

IPTV Security: Protecting High-Value Digital Contents

IPTV Security: Protecting High-Value Digital Contents...

Author: David H. Ramirez (Alcatel-Lucent)
ISBN: 9780470519240
Format: Hardback
$232.95

Television was one of the inventions that shaped the way society and culture evolved over the second half of the...  Read More >>

Windows Server 2008 Networking and Network Access Protection (NAP)

Windows Server 2008 Networking and Network Access Protection...

Author: Joseph Davies ,  Tony Northrup
ISBN: 9780735624221
Format: Mixed media product
$158.37

 Read More >>

Securing Data Centers with Catalyst Switches

Securing Data Centers with Catalyst Switches

Author: Muninder Sambi ,  Sanjay Hooda
ISBN: 9781587053078
Format: Paperback
$184.80

 Read More >>

Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

Author: Johnny Long (Security Researcher, Founder of Hackers For Charity) ,  Bill Gardner (Bill Gardner OSCP, i-Net+, Security+, Asst. Prof. at Marshall University)
ISBN: 9781597491761
Format: Paperback
$131.87

Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly...  Read More >>

Web Application Vulnerabilities: Detect, Exploit, Prevent

Web Application Vulnerabilities: Detect, Exploit, Prevent...

Author: Steven Palmer (Member of the FBI’s Infragard Organization and Penetration Tester of Critical Federal Network Infrastructure)
ISBN: 9781597492096
Format: Paperback
$166.19

Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security...  Read More >>

Financial Cryptography and Data Security: 11th International Conference, FC 2007, and First International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad/Tobago, February 12-16, 2007. Revised Selected Papers

Financial Cryptography and Data Security: 11th International...

Author: Sven Dietrich ,  Rachna Dhamija
ISBN: 9783540773658
Format: Paperback
$211.07

The 11th International Conference on Financial Cryptography and Data Security (FC 2007, http://fc07. The conference...  Read More >>

Securing Your PC in Easy Steps

Securing Your PC in Easy Steps

Author: M. Lee
ISBN: 9781840783360
Format: Paperback
$39.57

"In today's super-connected computing world, your PC enjoys a richer diversity of applications, multimedia, and...  Read More >>

Ajax Security

Ajax Security

Author: Billy Hoffman ,  Bryan Sullivan
ISBN: 9780321491930
Format: Paperback
$145.17

The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities   More and more Web sites are...  Read More >>

The Internet

The Internet

Author: Lauri S Friedman ,  Lauri S Friedman
ISBN: 9780737735673
Format: Hardback
$97.15

This volume discusses whether the Internet helps or hurts society and education, whether it is a safe medium for...  Read More >>

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Dr. Tom Shinder's ISA Server 2006 Migration Guide

Author: Thomas W Shinder (Member of Microsoft’s ISA Server Beta Team and Microsoft MVP for ISA Server, Dallas, TX, U.S.A.)
ISBN: 9781597491990
Format: Paperback
$131.87

Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips...  Read More >>

Your Neighbor's Secret Life Online: Protecting Families from Internet Conmen, Scammers and Predators

Your Neighbor's Secret Life Online: Protecting Families...

Author: Stephen Dean
ISBN: 9780882822945
Format: Paperback
$42.11

An account of real people with real internet secrets. And the author offers preventative strategies to protect your...  Read More >>

Network Security Assessment

Network Security Assessment

Author: Chris McNab
ISBN: 9780596510305
Format: Paperback
$131.97

How secure is your network? The best way to find out is to attack it. This book provides you with the tricks and...  Read More >>

Securing Peer-to-Peer Video Conferences - From concepts to implementations

Securing Peer-to-Peer Video Conferences - From concepts...

Author: Fuwen Liu
ISBN: 9783836452823
Format: Paperback
$234.96

 Read More >>

VoIP Network Security and Forensic Models Using Patterns

VoIP Network Security and Forensic Models Using Patterns...

Author: Juan C Pelaez
ISBN: 9783836428132
Format: Paperback
$234.96

Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However,...  Read More >>

Craft of System Security, The

Craft of System Security, The

Author: Sean Smith ,  John Marchesini
ISBN: 9780321434838
Format: Paperback
$87.95

Whether you're a security practitioner, developer, manager, or administrator, this book will give you the deep understanding...  Read More >>

Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks

Insider Computer Fraud: An In-depth Framework for Detecting...

Author: Kenneth Brancik
ISBN: 9781420046595
Format: Hardback
$120.00

Employees know a company's computer system better than anyone and have access to important information about the...  Read More >>

Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers

Security Protocols: 13th International Workshop, Cambridge,...

Author: Bruce Christianson ,  Bruno Crispo
ISBN: 9783540771555
Format: Paperback
$211.07

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop.  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List