Angebote zu "Ebook" (7.584 Treffer)

The Rules of Security (eBook, ePUB)
11,95 € *
ggf. zzgl. Versand

This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
The Rules of Security (eBook, PDF)
11,95 € *
ggf. zzgl. Versand

This book demystifies and explains a subject that affects every one of us in our private lives and at work. Security is a practical discipline concerned with safeguarding lives, property, information, wealth, reputations, and social wellbeing. It is the basis of civilised society. People, businesses, and nations cannot thrive in its absence, whereas the right kind of security frees us to live fulfilling lives. But deciding what is needed, and then making it happen, is not easy. The threats to our security are complex and continually evolving, as criminals, hackers, terrorists, and hostile foreign states continually find new ways of staying one step ahead of us, their potential victims. At the same time, we are continually creating new vulnerabilities as we adopt new technologies and new ways of working. Those who do not understand the fundamentals of security, risk, and resilience open themselves, and those around them, to avoidable dangers, needless anxieties, and unnecessary costs. Inadequate security may leave them exposed to intolerable risks, while the wrong kind of security is expensive, intrusive, and ineffective. In his essential new book, world-leading security expert Paul Martin sets out the ten most important guiding principles of protective security and resilience. Clearly expressed in the form of simple but powerful rules of thumb, their purpose is to help solve complicated problems for which there are no textbook solutions. The rules offer a powerful toolkit, designed to work in many different situations, including the cyber domain. When we are faced with novel problems requiring complex decisions, it is easy to focus on the wrong things. These rules remind us what really matters. The psychological and behavioural aspects of security are key themes throughout the book. People lie at the heart of security. The criminals, terrorists, and hackers are social animals with complex emotions and psychological predispositions. So too are the victims of those attackers and the security practitioners who strive to protect us. The human dimension is therefore crucial to understanding security. The Rules of Security will help anyone with an interest in their own security and that of their home, family, business, or society. It will be indispensable to those in positions of responsibility, allowing them to understand how best to protect their organisation, people, and assets. It assumes no expert technical knowledge and explains the ideas in clear and simple terms. It will appeal to anyone with an interest in security. If you read only one book about security, it should be this one.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
JavaScript Security (eBook, ePUB)
2,99 € *
ggf. zzgl. Versand

Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte Botnets genauer betrachtet. Kapitel 2 geht auf die Sicherheitssituation von HTML5 ein. Dabei beleuchtet der Autor die Gefahrenpotenziale der neuen Grafikfunktionen der Auszeichnungssprache. Kapitel 3 beschäftigt sich mit neuen und verbesserten Angriffen, die auf Sicherheitskonferenzen vorgestellt wurden. Der Autor beschreibt, wie JavaScript-basierte Schadsoftware in den Browser gelangen kann und geht auf den Umgang mit den Sicherheitsangriffen ein. Hierzu werden das OWASP Enterprise Security API sowie die Content Service Policy zur Abwehr von XSS erläutert.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
SIP Security (eBook, PDF)
81,99 € *
ggf. zzgl. Versand

This book gives a detailed overview of SIP specific securityissues and how to solve them While the standards and products for VoIP and SIP services havereached market maturity, security and regulatory aspects of suchservices are still being discussed. SIP itself specifies only abasic set of security mechanisms that cover a subset of possiblesecurity issues. In this book, the authors survey important aspectsof securing SIP-based services. This encompasses a description ofthe problems themselves and the standards-based solutions for suchproblems. Where a standards-based solution has not been defined,the alternatives are discussed and the benefits and constraints ofthe different solutions are highlighted. Key Features: * Will help the readers to understand the actual problems ofusing and developing VoIP services, and to distinguish between realproblems and the general hype of VoIP security * Discusses key aspects of SIP security includingauthentication, integrity, confidentiality, non-repudiation andsignalling * Assesses the real security issues facing users of SIP, anddetails the latest theoretical and practical solutions to SIPSecurity issues * Covers secure SIP access, inter-provider secure communication,media security, security of the IMS infrastructures as well as VoIPservices vulnerabilities and countermeasures againstDenial-of-Service attacks and VoIP spam This book will be of interest to IT staff involved in deployingand developing VoIP, service users of SIP, network engineers,designers and managers. Advanced undergraduate and graduatestudents studying data/voice/multimedia communications as well asresearchers in academia and industry will also find this bookvaluable.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
Hacking & Security (eBook, ePUB)
44,90 € *
ggf. zzgl. Versand

Know your enemy and know yourself Schwachstellen verstehen, Angriffsvektoren identifizieren Infrastrukturen absichern: Linux, Windows, Mobile, Cloud, IoT Anleitungen für Metasploit, Kali, hydra, OpenVAS, Empire, Pen-Tests, Exploits It´s not a bug, it´s a backdoor ! Nur wenn Sie verstehen, wie ein Angreifer denkt, können Sie Ihre Systeme auch wirklich sicher machen. Dieses Buch ist der Schlüssel dazu. Die Security-Spezialisten rund um Bestseller-Autor Michael Kofler vermitteln Ihnen das ganze Know-how, um Ihre Infrastrukturen vor Angriffen zu schützen ? Praxisbeispiele und konkrete Szenarien inklusive. Von der Absicherung des Active Directory bis zum Einsatz von Kali Linux, von der Suche nach Exploits bis zur Härtung von Webservern ? hier werden Sie zum Security-Experten! Aus dem Inhalt: Kali Linux Hacking-Tools (nmap, hydra, Metasploit, OpenVas) Externe Sicherheitsüberprüfung Penetration Testing (Client und Server) Basisabsicherung: Linux und Windows, Active Directory und Samba Cloud-Sicherheit: AWS, NextCloud, Office 365 Hacking und Security von Smartphones Web-Anwendungen absichern und angreifen Exploits: Buffer Overflows, Fuzzing, Heap Spraying und mehr IoT-Geräte und -Infrastruktur

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
SQL Server Security (eBook, ePUB)
33,99 € *
ggf. zzgl. Versand

Alles Wissenswerte rund um Security mit SQL-Datenbanken Für Datenbankentwickler, Betriebswirte und Projektleiter Stand SQL Server 2012 Aus dem Inhalt: Aufwand vs. Sicherheit - Was ist angemessen? Sprich »Freund« und tritt ein – Authentifizierung Benutzer und Rollen Rechte – Der Unterschied zwischen Wollen und Dürfen Softwarearchitektur und Datenbank-Sicherheit Rechteprüfung in der Anwendung SQL-Injection Verschlüsselung mit Zertifikaten und asymmetrischen Schlüsseln Symmetrische Verschlüsselung Daten hashen und signieren Security-Features rund um gespeicherte Prozeduren Auditing Andere bewährte Vorgehensweisen Umgang mit Meldungen über Sicherheitslücken In diesem Buch geht es um typische Angriffe, zu denen Schwächen und Sicherheitslücken in Datenbank-Anwendungen möglicherweise geradezu einladen. Das Themenspektrum, das in diesem Buch abgehandelt wird, reicht von Einsteigerthemen wie die effektive Nutzung von Rechten, Logins, User und Gruppen über die verschiedenen Verschlüsselungsmöglichkeiten der Daten bis hin zu Expertenthemen wie die Signierung von SQL-Code. Die bekannt gewordenen Angriffe der letzten Jahre zeigten zwar, dass auch bei der Administration von IT-Systemen eklatante Mängel vorkamen, dass die wirklich gravierenden und entscheidenden Sicherheitsprobleme aber durch die Anwendungen selbst verursacht wurden. Es geht also vorrangig darum, die Möglichkeiten und Grenzen bei der Entwicklung von Datenbank-Anwendungen aufzuzeigen, zumal mit den Mitteln, die SQL bereit stellt, bereits viele Schwierigkeiten umschifft werden können. Das Buch richtet sich vornehmlich an Software-Entwickler, darüber hinaus aber auch an Betriebswirte, die verstehen wollen, warum manche »einfache« Vorgaben einen immensen Aufwand verursachen, sowie an Projektleiter, die schon bei der grundlegenden Architektur der Anwendung Sicherheitsaspekte berücksichtigen wollen. Sowohl Einsteiger, die sich mit den Grundlagen der SQL-Security vertraut machen wollen, als auch Fortgeschrittene, die tiefer in die Materie eintauchen möchten, werden von diesem Buch profitieren. Thomas Glörfeld studierte Informatik mit Schwerpunkt Datenbanksysteme. Seit 1995 beschäftigt er sich als Berater mit der Sicherheit rund um SQL-Datenbank-Anwendungen, seit der Version 4.21 für den Microsoft SQL Server, inkl. Abstecher zum Sybase SQL Anywhere. Thomas Glörfeld studierte Informatik mit Schwerpunkt Datenbanksysteme. Seit 1995 beschäftigt er sich als Berater mit der Sicherheit rund um SQL-Datenbank-Anwendungen, seit der Version 4.21 für den Microsoft SQL Server, inkl. Abstecher zum Sybase SQL Anywhere.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
Pro PHP Security (eBook, PDF)
35,95 € *
ggf. zzgl. Versand

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3,the second edition of this authoritative PHP security book coversfoundational PHP securitytopics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a lot of material on secure PHP development, the basics of encryption, secure protocols, as well as how to reconcile the demands of server-side and web application security.

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
Information Technology Protection and Homeland ...
77,95 € *
ggf. zzgl. Versand

The eleventh volume of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Information Technology Protection and Homeland Security is an eye-opening account of a diverse and complex sector. This book describes the processes needed to identify assets, assess risk, implement protective programs and resilience strategies, and measure their effectiveness. While the IT sector can never be made immune to all possible intrusions or hacks, a concerted, well thought out effort to incorporate security upgrades along with careful planning for facilities can help minimize attacks. Although Information Technology Protection and Homeland Security was written to serve information technology (IT) personnel, project designers, communications technicians, and all computer operators who have an interest in the IT sector, the text is accessible to those who have no experience with the IT sector. While working through the text systematically, the reader will gain an understanding of the need for a heightened sense of awareness of the present threat facing the IT sector. Moreover, the reader will gain knowledge of security principles and measures that can be implemented?adding a critical component to not only the reader´s professional knowledge but also providing them the tools needed to combat terrorism. Other books in the Critical Infrastructure and Homeland Security Series include: Dam Sector Protection and Homeland Security Energy Infrastructure Protection and Homeland Security Food Supply Protection and Homeland Security Transportation Protection and Homeland Security Government Facilities Protection and Homeland Security

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot
Intenções Perversas (Série Steele Security) (eB...
3,99 € *
ggf. zzgl. Versand

Um assassino implacável está à solta, ameaçando a vida de uma mulher inocente. Segredos dolorosos do passado de Rebel serão exumados e exibidos completamente. Desespero o impulsiona a salvar a vida da única mulher que ele já amou. Tragédia atinge da maneira mais inesperada, reduzindo paredes outrora fortes a mero entulho. O ponto de ruptura de um homem é onde outro homem encontra seu avanço. O amor verdadeiro não pode ser comprometido. Nem pelo tempo Nem pela distância Nem pela ação Mas pode florescer? Dizem que o bem triunfa sobre o mal e o amor conquista tudo. Mas pode um inimigo ser derrotado se as linhas entre o bem e o mal estão confusas? Quando a poeira baixa e a fumaça se dissipa, o último homem em pé vence. Pode Rebel superar as intenções perversas que o ludibriaram?

Anbieter: buecher.de
Stand: 23.05.2019
Zum Angebot