Network security books

10034 books were found.

Secure Data Management: Second VLDB Workshop, SDM 2005, Trondheim, Norway, August 30-September 2, 2005, Proceedings

Secure Data Management: Second VLDB Workshop, SDM 2005,...

Author: Willem Jonker ,  Milan Petkovic
ISBN: 9783540287988
Format: Paperback
$166.32

Constitutes the refereed proceedings of the Second VLDB 2005 International Workshop on Secure Data Management, SDM...  Read More >>

1337 h4x0r h4ndb00k

1337 h4x0r h4ndb00k

Author: tapeworm
ISBN: 9780672327278
Format: Paperback
$65.97

Attempts to show you how to walk-the-walk and talk-the-talk of the elusive underworld of the Internet, home to millions...  Read More >>

PHP Architect's Guide to PHP Security: A Step-by-step Guide to Writing Secure and Reliable PHP Applications

PHP Architect's Guide to PHP Security: A Step-by-step...

Author: Ilia Alshanetsky ,  Rasmus Lerdorf
ISBN: 9780973862102
Format: Paperback
$87.09

Written by one of the foremost experts on PHP security in the world, this book focuses on providing the readers...  Read More >>

Spyware

Spyware

Author: John S Yang
ISBN: 9781594546488
Format: Hardback
$135.96

Spyware may collect information about a computer user's activities and transmit that information to someone else....  Read More >>

Rootkits: Subverting the Windows Kernel

Rootkits: Subverting the Windows Kernel

Author: Greg Hoglund ,  Jamie Butler
ISBN: 9780321294319
Format: Paperback
$158.37

Intended for those working in the field of cyber-security, this book helps the readers understand the growing threat...  Read More >>

The Chief Information Security Officer's Toolkit: Governance Guidebook

The Chief Information Security Officer's Toolkit: Governance...

Author: Fred Cohen
ISBN: 9781878109347
Format: Paperback
$340.56

The CISO Toolkit is a collection of books and software for the Chief Information Security Officer (CISO) of a substantial...  Read More >>

A Singing Contest: Conventions of Sound in the Poetry of Seamus Heaney

A Singing Contest: Conventions of Sound in the Poetry...

Author: Meg Tyler
ISBN: 9780415975391
Format: Hardback
$197.00

Incorporating readings of Heaney's elegies, pastoral eclogues and sonnets, this book presents a formal analysis...  Read More >>

Host Integrity Monitoring Using Osiris and Samhain

Host Integrity Monitoring Using Osiris and Samhain

Author: Brian Wotring
ISBN: 9781597490184
Format: Paperback
$123.95

 Read More >>

SUSE LINUX Enterprise Server 9 Administrator's Handbook

SUSE LINUX Enterprise Server 9 Administrator's Handbook...

Author: Peter Kuo ,  Jacques Beland
ISBN: 9780672327353
Format: Paperback
$131.97

Provides a single source of information covering the depth needed to build a secure SLES 9 platform. Provides step-by-step...  Read More >>

IM Instant Messaging Security

IM Instant Messaging Security

Author: John Rittinghouse, PhD, CISM (SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX) ,  James F. Ransome, PhD, CISM, CISSP (James F. Ransome, Ph.D., CISSP, CISM,SVP, Managed Security Services)
ISBN: 9781555583385
Format: Paperback
$94.95

Includes a coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security....  Read More >>

Networks, Security and Complexity: The Role of Public Policy in Critical Infrastructure Protection

Networks, Security and Complexity: The Role of Public...

Author: Sean P. Gorman
ISBN: 9781843769521
Format: Hardback
$241.35

The author provides the economic, policy, and physics background to the issues of infrastructure security, along...  Read More >>

Windows Server 2003: Designing Network  Security (Exam 70-298)

Windows Server 2003: Designing Network Security (Exam...

Author: Kenneth C. Laudon
ISBN: 9780131176706
Format: Paperback
$225.98

For courses focusing on Windows Server 2003 and MCSE/MSCA Certification.   The only academic certification series...  Read More >>

Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security

Bulletproof Wireless Security: GSM, UMTS, 802.11, and...

Author: Praphul Chandra (Texas Instruments, Germantown, MD, USA)
ISBN: 9780750677462
Format: Paperback
$80.95

A guide to effective security for both voice and data wireless networks. It offers the conceptual and practical...  Read More >>

Securing Your Business with Cisco ASA and PIX Firewalls

Securing Your Business with Cisco ASA and PIX Firewalls...

Author: Greg Abelar
ISBN: 9781587052149
Format: Paperback
$105.60

Provides you with step-by-step processes for using Cisco ASDM in conjunction with Cisco Security Agent to ensure...  Read More >>

Digitaler Personalausweis: Eine Machbarkeitsstudie

Digitaler Personalausweis: Eine Machbarkeitsstudie

Author: Herbert Reichl ,  Alexander Roßnagel
ISBN: 9783835000544
Format: Paperback
$158.37

Das Buch präsentiert die Ergebnisse einer Machbarkeitsstudie, die von der Bundesregierung in Auftrag gegeben wurde....  Read More >>

Cisco Security Agent

Cisco Security Agent

Author: Chad Sullivan
ISBN: 9781587052057
Format: Paperback
$158.40

Presents a detailed explanation of Cisco Security Agent (CSA), illustrating the use of the product in a step-by-step...  Read More >>

Cisco PIX Firewalls: Configure / Manage / Troubleshoot

Cisco PIX Firewalls: Configure / Manage / Troubleshoot...

Author: Umer Khan
ISBN: 9781597490047
Format: Paperback
$137.15

The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification...  Read More >>

SSH, The Secure Shell

SSH, The Secure Shell

Author: Daniel J Barrett ,  Richard Silverman
ISBN: 9780596008956
Format: Paperback
$105.47

With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform...  Read More >>

Protect Your Windows Network: From Perimeter to Data

Protect Your Windows Network: From Perimeter to Data...

Author: Jesper M. Johansson ,  Steve Riley
ISBN: 9780321336439
Format: Mixed media product
$171.57

Presents a Defense in Depth model for protecting various Windows networks. This book addresses the three elements...  Read More >>

Contemporary Cryptography

Contemporary Cryptography

Author: Rolf Oppliger
ISBN: 9781580536424
Format: Hardback
$261.36

Delivering an accurate introduction to the modern cryptography, this book offers an understanding of essential tools...  Read More >>

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services

Deploying Citrix MetaFrame Presentation Server 3.0 with...

Author: Melissa Craft (Vice President of Dane Holdings, Inc., USA)
ISBN: 9781932266504
Format: Paperback
$137.15

Covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services. This book shows how to...  Read More >>

VB.NET Hacks and Pranks

VB.NET Hacks and Pranks

Author: Alexander Klimov
ISBN: 9781931769440
Format: Mixed media product
$92.27

This study of the VB.NET programming language through hacks and pranks relates to all contemporary versions of the...  Read More >>

Check Point CCSA Exam Cram 2 (Exam 156-210.4)

Check Point CCSA Exam Cram 2 (Exam 156-210.4)

Author: Sean Walberg ,  Que Corporation
ISBN: 9780789731098
Format: Mixed media product
$92.37

Provides an overview of the Check Point's certification exam, 156-210.4. Written by an experienced and CCSA, CCSE...  Read More >>

Network Security Tools

Network Security Tools

Author: Nitesh Dhanjani ,  Justin Clarke-Salt
ISBN: 9780596007942
Format: Paperback
$92.27

This concise guide shows experienced administrators how to customize and extend popular open source security tools...  Read More >>

Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List