Categories : Security |
INFORMATION SECURITY: AN OVERVIEW |
This basic text guides you through the various aspects of information security, moving into the world of threats-from outside as well as from within; the virus threats-and ways to prevent them.
it introduces you to the measures to counter security b...
Publication : Phi
NRS 312.00
|
|
|
|
INTRODUCTION TO INFORMATION SECURITY RISK MANAGEMENT |
Today, critical business information is being stored, processed and transferred through the electronic medium to gain a competitive edge in the market. along with the advantages, technology also brings various threats to information and network resou...
Publication : Phi
NRS 400.00
|
|
|
|
INFORMATION SECURITY: POLICIES AND IMPLEMENTATION ISSUES |
Published by phi.
Publication : Phi
NRS 312.00
|
|
|
|
BASICS OF NETWORK SECURITY, FIREWALLS AND VPNS |
In this book, you are offered with a basic understanding of network security with respect to the internet and intranet. the concepts of network security are attended through in-depth examination of firewalls, and virtual private networks (vpns)-tools...
Publication : Niit
NRS 312.00
|
|
|
|
WEB SECURITY, PRIVACY & COMMERCE, 2ND EDITION |
Since the first edition of this classic reference was published, world wide web use has exploded and e-commerce has become a daily part of business and personal life. as web use has grown, so have the threats to our security and privacy--from credit ...
Publication : Oreilly
NRS 800.00
|
|
|
|
WEB PRIVACY WITH P3P |
Web site developers balance their need to collect information about users with their obligation to show respect for their users' privacy. the platform for privacy preferences project, or p3p, has emerged as a technology that may satisfy the wishes o...
Publication : Oreilly
NRS 480.00
|
|
|
|
SSH, THE SECURE SHELL: THE DEFINITIVE GUIDE |
Secure your computer network with ssh! with transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, ssh (secure shell) is a popular, robust, tcp/ip-based solution to many network secur...
Publication : Oreilly
NRS 840.00
|
|
|
|
SECURITY WARRIOR |
When it comes to network security, many users and administrators are running scared, and justifiably so. the sophistication of attacks against computer systems increases with each new internet worm.
what's the worst an attacker can do to you? you'...
Publication : Oreilly
NRS 800.00
|
|
|
|
SECURITY POWER TOOLS |
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? security power tools lets you do exactly that! members of juniper networks' security engineering team and a f...
Publication : Oreilly
NRS 1040.00
|
|
|
|
SECURITY AND USABILITY |
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. security experts have largely ignored usability issues--both because they often failed to recognize the importance of hum...
Publication : Oreilly
NRS 880.00
|
|
|
|
|