Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
LEARNING PYTHON, 5TH EDITION POWERFUL OBJECT-ORIENTED PROGRAMMING
NRS 2880.00
 
Book details / order
INFORMATION SECURITY THE COMPLETE REFERENCE, SECOND EDITION
Develop and implement an effective end-to-end security program today?s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every it professional. information security: the complete reference, second edition (previously titled network security: the complete reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. thoroughly revised and expanded to cover all aspects of modern information security?from concepts to details?this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional. find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. you?ll learn how to successfully protect data, networks, computers, and applications. in-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, unix and windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. included is an extensive security glossary, as well as standards-based references. this is a great resource for professionals and students alike. understand security concepts and building blocks identify vulnerabilities and mitigate risk optimize authentication and authorization use irm and encryption to protect unstructured data defend storage devices, databases, and software protect network routers, switches, and firewalls secure vpn, wireless, voip, and pbx infrastructure design intrusion detection and prevention systems develop secure windows, java, and mobile applications perform incident response and forensic analysis. table of contents: part i foundations 1 information security overview 2 risk analysis 3 compliance with standards, regulations, and laws 4 secure design principles 5 security policies, standards, procedures, and guidelines 6 security organization 7 authentication and authorization part ii data security 8 securing unstructured data 9 information rights management 10 encryption 11 storage security 12 database security part iii network security 13 secure network design 14 network device security 15 firewalls 16 virtual private networks 17 wireless network security 18 intrusion detection and prevention systems 19 voice over ip (voip) and pbx security part iv computer security 20 operating system security models 21 unix security 22 windows security 23 securing infrastructure services 24 virtual machines and cloud computing 25 securing mobile devices part v application security 26 secure application design 27 writing secure software 28 j2ee security 29 windows .net security 30 controlling application behavior part vi security operations 31 security operations management 32 disaster recovery, business continuity, backups, and high availability 33 incident response and forensic analysis part vii physical security 34 physical security.

Author : Mark rhodes-ousley
Publication : Tata
Isbn : 9781259098345
Store book number : 109
NRS 952.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST SWIFT: A LEARNER'S GUIDE TO PROGRAMMING WITH SWIFT, 1ST EDITION
NRS 1920.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008