Stöbern Sie durch unsere Angebote (225 Treffer)

Kategorien

Shops [Filter löschen]

Practical Security
21,99 € *
ggf. zzgl. Versand

Examples in the book describe security vulnerabilities and how to look for them

Anbieter: buecher.de
Stand: 19.04.2019
Zum Angebot
The Rules of Security
16,99 € *
ggf. zzgl. Versand

Threats to security affect all of us, as criminals, hackers, terrorists, and hostile foreign states continually find new ways to exploit us, their potential victims. World-leading security expert Paul Martin sets out ten guiding principles of protective security - a toolkit that is relevant to individuals, families, businesses, and government.

Anbieter: buecher.de
Stand: 17.04.2019
Zum Angebot
Hadoop Security
42,99 € *
ggf. zzgl. Versand

This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Anbieter: buecher.de
Stand: 17.04.2019
Zum Angebot
CompTIA Security+
49,99 € *
ggf. zzgl. Versand

Fundierter Überblick zum Thema IT-Sicherheit Erläuterungen zu allen Themen der aktuellen CompTIA-Prüfung SYO-501 Mit Vorbereitungsfragen zu jedem Fachgebiet Informationssicherheit ist heute ein zentrales Thema in jeder IT-Umgebung. Entsprechend müssen Unternehmen und Fachleute sich in die Thematik einarbeiten und kontinuierlich weiterbilden. Die Zertifizierung CompTIA Security+ stellt hierzu einen praxisnahen Kompetenznachweis zur Verfügung, der die wichtigsten Themen abdeckt und regelmäßig aktualisiert. In der aktuellen Fassung der Prüfung (SYO-501) lauten diese: Bedrohungen, Attacken und Schwachstellen Technologien und Tools Architektur und Design Identitäts- und Zugriffsverwaltung Risiko-Management Kryptografie und PKI Entsprechend behandeln die Autoren die genannten Themenbereiche ausführlich und vermitteln Ihnen mit diesem Buch das für die Zertifizierung notwendige Fachwissen. Im Zentrum steht dabei weniger die Auflistung aller möglichen und unmöglichen Abkürzungen aus diesem Bereich, sondern die Schaffung eines praxistauglichen Verständnisses für die Thematik. Aus dem Inhalt: Sicherheitsmanagement und Richtlinien Grundlagen der Kryptografie Unterschiedliche Zugriffsverfahren Authentifizierungsmethoden Biometrische Erkennungssysteme Sicherheit durch Redundanz Physische Sicherheitsmaßnahmen Grundlagen der Systemhärtung Gefahren durch Malware Social Engineering Phishing, Pharming und andere Bösartigkeiten So sichern Sie den Mailverkehr Sicherheit für Protokolle Denial of Service, Pufferüberlauf, Race-Condition Cross-Site-Scripting, SQL-Injection, LDAP-Injection Spoofing, Man-in-the-Middle, Session-Hijacking Sichere Verbindungen durch VPN und Remote Access Was helfen RADIUS, TACACS, SSL, SSH? WLAN sicher konfigurieren System- und Netzwerküberwachung Analyseprogramme: Wireshark, RRDTools, Nagios Unterschiedliche Firewallkonzepte Methoden der Datensicherung Disaster Recovery Planung Pentesting und Forensics Metasploit Framework Security Audit

Anbieter: buecher.de
Stand: 20.04.2019
Zum Angebot
Disaster Security
38,99 € *
ggf. zzgl. Versand

This book details intelligence and military planning methods for anticipating environmental and security-related disasters. It offers an inside view of planning processes in the US government using scenarios and simulations. With a focus on innovative solutions, it is invaluable for a broad audience of practitioners, policymakers, and scholars.

Anbieter: buecher.de
Stand: 20.04.2019
Zum Angebot
Threat Modeling: Designing for Security
62,99 € *
ggf. zzgl. Versand

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier´s Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You´ll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you´ll find tools and a framework for structured thinking about what can go wrong. Software developers, you´ll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you´ll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. * Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs * Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric * Provides effective approaches and techniques that have been proven at Microsoft and elsewhere * Offers actionable how-to advice not tied to any specific software, operating system, or programming language * Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you´re ready with Threat Modeling: Designing for Security.

Anbieter: buecher.de
Stand: 16.04.2019
Zum Angebot
A Criminology of Policing and Security Frontiers
78,99 € *
ggf. zzgl. Versand

Including novel case studies, this multi-disciplinary book assembles a rich collection of policing and security frontiers both geographical (e.g. the margins of cities) and conceptual (dispersion and credentialism) not seen or acknowledged previously, pushing criminology to the edge of its current understanding.

Anbieter: buecher.de
Stand: 16.04.2019
Zum Angebot
The National Security Sublime
138,99 € *
ggf. zzgl. Versand
Anbieter: buecher.de
Stand: 16.04.2019
Zum Angebot
SIP Security (eBook, PDF)
81,99 € *
ggf. zzgl. Versand

This book gives a detailed overview of SIP specific securityissues and how to solve them While the standards and products for VoIP and SIP services havereached market maturity, security and regulatory aspects of suchservices are still being discussed. SIP itself specifies only abasic set of security mechanisms that cover a subset of possiblesecurity issues. In this book, the authors survey important aspectsof securing SIP-based services. This encompasses a description ofthe problems themselves and the standards-based solutions for suchproblems. Where a standards-based solution has not been defined,the alternatives are discussed and the benefits and constraints ofthe different solutions are highlighted. Key Features: * Will help the readers to understand the actual problems ofusing and developing VoIP services, and to distinguish between realproblems and the general hype of VoIP security * Discusses key aspects of SIP security includingauthentication, integrity, confidentiality, non-repudiation andsignalling * Assesses the real security issues facing users of SIP, anddetails the latest theoretical and practical solutions to SIPSecurity issues * Covers secure SIP access, inter-provider secure communication,media security, security of the IMS infrastructures as well as VoIPservices vulnerabilities and countermeasures againstDenial-of-Service attacks and VoIP spam This book will be of interest to IT staff involved in deployingand developing VoIP, service users of SIP, network engineers,designers and managers. Advanced undergraduate and graduatestudents studying data/voice/multimedia communications as well asresearchers in academia and industry will also find this bookvaluable.

Anbieter: buecher.de
Stand: 16.04.2019
Zum Angebot
Codes, Cryptology and Information Security
59,99 € *
ggf. zzgl. Versand

This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019. The 19 regular papers presented together with 5 invited talks were carefully reviewed and selected from 90 submissions. The first aim of this conference is to pay homage to Said El Hajji for his valuable contribution in research, teaching and disseminating knowledge in numerical analysis, modeling and information security in Morocco, Africa, and worldwide. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory, and information security.

Anbieter: buecher.de
Stand: 16.04.2019
Zum Angebot