Categories : Security |
SECURING WINDOWS SERVER 2003 |
With the success of computer viruses like slammer, security issues are now a top priority for windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. if you use windows 2003 server at a sm...
Publication : Oreilly
NRS 640.00
|
|
|
|
SECURING WINDOWS NT/2000 SERVERS FOR THE INTERNET |
In recent years, windows nt and windows 2000 systems have emerged as viable platforms for internet servers. more and more organizations are now entrusting the full spectrum of business activities--including e-commerce--to windows.
unfortunately, the...
Publication : Oreilly
NRS 200.00
|
|
|
|
SECURE PROGRAMMING COOKBOOK FOR C AND C++ |
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. at the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone a...
Publication : Oreilly
NRS 960.00
|
|
|
|
SECURE CODING PRINCIPLES & PRACTICES |
Practically every day, we read about a new type of attack on computer systems and networks. viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable ...
Publication : Oreilly
NRS 360.00
|
|
|
|
COMPTIA SECURITY + DELUXE STUDY GUIDE(EXAM SYO-201) |
Published by sybex.
Publication : Sybex
NRS 880.00
|
|
|
|
MASTERING FREEBSD AND OPENBSD SECURITY |
Freebsd and openbsd are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over linux. although a lot can be said for the robustness, clean organizat...
Publication : Oreilly
NRS 680.00
|
|
|
|
MANAGING SECURITY WITH SNORT AND IDS TOOLS |
Intrusion detection is not for the faint at heart. but, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, st...
Publication : Oreilly
NRS 480.00
|
|
|
|
SECURITY INTELLIGENCE |
Security intelligence: a practitioner's guide to solving enterprise security challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security ...
Publication : Wiley
NRS 960.00
|
|
|
|
INTERNET FORENSICS USING DIGITAL EVIDENCE TO SOLVE |
Because it's so large and unregulated, the internet is a fertile breeding ground for all kinds of scams and schemes. usually it's your credit card number they're after, and they won't stop there. not just mere annoyances, these scams are real cri...
Publication : Oreilly
NRS 440.00
|
|
|
|
INFORMATION SYSTEMS SECURITY |
Security was, is, and will always be a double edged sword. you have to expose your
systems and applications to the external world in order to conduct business; but you
want to remain in control. how does one achieve this balance?
the best approach, ...
Publication : Wiley
NRS 1120.00
|
|
|
|
|