Suche einschränken:
Zur Kasse

190 Ergebnisse - Zeige 1 von 20.

The Cloud Security Ecosystem

Choo, Raymond (Fulbright Scholar and Senior Lecturer, University of South Australia, Research Director, Cloud Security Alliance, Australia Chapter) / Ko, Ryan (Senior Lecturer, University of Waikato, New Zealand)
The Cloud Security Ecosystem
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical ...

CHF 139.00

Seven Deadliest Web Application Attacks

Shema, Mike (Web Application Security Solutions, Qualys, Inc.)
Seven Deadliest Web Application Attacks
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to learn about the worst of the worst is to read the seven books in our Seven Deadliest Attacks series. The content for each of the books has been selected by our team of authors and the guys from Pauldotcom, a weekly podcast reaching 30, 000 people, to make sure that we are covering the most vicious attacks out there. Not only do we let ...

CHF 33.50

Buffer Overflow Attacks

Deckard, Jason
Buffer Overflow Attacks
Buffer overflows make up one of the largest collections of vulnerabilities in existence, And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim's machine with the equivale...

CHF 46.90

The Best Damn IT Security Management Book Period

Snedaker, Susan (MCSE, MCT Founder, Virtual Team Consulting, Tucson, AZ, USA) / McCrie, Robert (Professor, John Jay University, New York, NY, USA)
The Best Damn IT Security Management Book Period
The Best Damn Security Manager's Handbook Periodhas comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedakers, this volume is an indispensable addition to a serious security professional's toolkit. Coverage includes Business Continuity, Risk Assessment, Protection Assets, Project Mana...

CHF 79.00

Juniper(R) Networks Secure Access SSL VPN Configuration G...

Cameron, Rob (Security Solutions Engineer for Juniper Networks, San Jose, CA) / Wyler, Neil R. (Contractor for Juniper Networks Security Products Group, Black Hat Staff Member, Salt Lake City, Utah)
Juniper(R) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or ...

CHF 79.00

Securing SQL Server

Cherry, Denny ((MCSA, MCDBA, MCTS, MCITP, MCM) has been working with Microsoft technology for over 15 years starting with Windows 3.51 and SQL Server 6.5.)
Securing SQL Server
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -a Microsoft SQL MVP and one of...

CHF 59.50

Essential Skills for Hackers

Cardwell, Kevin / Dalziel, Henry (Founder, Concise Ac Ltd, UK)
Essential Skills for Hackers
Bots: How to Detect and Prevent Them is a concise overview of the malicious behavior and threats posed by Bots to Internet and network security. Bots are automated software programs used to browse the web or other network systems, scraping information from the sites visited and in some cases, conducting malicious attacks such as denial-of-service attacks. Though Bots have been around for a long time, the security threats from Bots is evolving ...

CHF 47.90