All counter of AlamanShop


Warwick Ford, Michael S. Baum
Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption (2nd Edition)

y.
Publisher:
Description: [detailed...]

ISBN: 0130272760
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Dimitris Gritzalis
Secure Electronic Voting (Advances in Information Security)

y.
Publisher:
Description: [detailed...]

ISBN: 1402073011
Book size: ; Page extent: 0.

 

PUT TO
THE BASKET
Patrick McBride, Jody Patilla, Craig Robinson, Peter Thermos, Edward P. Moser
Secure Internet Practices: Best Practices for Securing Systems in the Internet and e-Business Age

y.
Publisher:
Description: [detailed...]

ISBN: 0849312396
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Rolf Oppliger
Secure Messaging with PGP and S/MIME

y.
Publisher:
Description: This unique new book offers you a comprehensive understanding of secure Internet messaging, and brings together all the relevant and critical information you need to use PGP and S/MIME-compliant software for your projects. It explores the conceptual and technical approaches followed by the developers of both PGP and S/MIME, and gives you a thorough treatment of the latest and most-effective technologies for secure messaging. The book teaches you how to use cryptographic techniques to secure messaginginfrastructures and applications, and examines the differences between two competing standard trck protocols for secure messaging on the Internet. Ideal for security and network managers, as well as professional system and network administrators, this easy-to-understand book provides you with the knowledge needed to evaluate the current state-of-the-art in Internet-based secure messaging with confidence. [detailed...]

ISBN: 158053161X
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Jalal Feghhi, Jalil Feghhi
Secure Networking with Windows 2000 and Trust Services

y.
Publisher:
Description: Another version of Windows, another way of thinking about security. Secure Networking with Windows 2000 and Trust Services explains how Windows 2000 interconnects users and resources, locally and across distances. With emphasis on extranets and virtual private networks (VPNs), this book is in large part an explanation of how to implement a public key infrastructure (PKI) with the services built into Windows 2000. In addition to providing a technically sound overview of Kerberos authentication and certificate management, the authors--two brothers who both specialize in PKI professionally--explain cryptography and IPsec, and show how to incorporate everything into various kinds of Windows 2000 networks. The Feghhis` approach is somewhat academic, with loads of endnotes and lots of diagrams depicting message contents and trust relationships. That`s not to say that this approach isn`t practical, because after all, any implementation of security services has to be based on an [detailed...]

ISBN: 0201657783
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Mohammed J. Kabir, Mohammed J. Kabir
Secure PHP Development: Building 50 Practical Applications

y.
Publisher:
Description: * Offers fifty practical and secure PHP applications that readers can immediately put to use * Explains the entire life cycle of each PHP application, including requirements, design, development, maintenance, and tuning * Reviews application development line-by-line and module-by-module to help readers understand specific coding practices and requirements * Applications can be readily adapted to many real-world business situations * CD-ROM contains fifty ready-to-use PHP applications, an evaluation version of Zend tools, and the latest versions of PHP, Apache, and MySQL [detailed...]

ISBN: 0764549669
Book size: ; Page extent: .

 

PUT TO
THE BASKET
John Viega, Matt Messier
Secure Programming Cookbook for C and C++

y.
Publisher:
Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to problems faced by those who care about the security of their applications. It covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering. The rich set of code samples provided in the book`s more than 200 recipes will help programmers secure the C and C++ programs they write for both Unix (including Linux) and Windows environments. The book`s web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. The Secure Programming Cookbook for C and C++ is destined to become an [detailed...]

ISBN: 0596003943
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Brian Chess, Jacob West
Secure Programming with Static Analysis (Addison-Wesley Software Security Series)

2007 y.
Publisher:
Description: The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their codeill be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Nowtheres a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most cmon types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how [detailed...]

ISBN: 0321424778
Book size: ; Page extent: 624.

 

PUT TO
THE BASKET
Qingfeng Chen, Chengqi Zhang, Shichao Zhang
Secure Transaction Protocol Analysis: Models and Applications (Lecture Notes in Computer Science)

2008 y.
Publisher:
Description: The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. It aims to serve as an overall course-aid and to provide self-study material for researchers and students in formal methods theory and applications in e-commerce, data analysis and data mining. The volume will also be useful to anyone interested in secure e-commerce. The book is organized in eight chapters covering the main approaches and tools in formal methods for security protocol analysis. It starts with an introductory chapter presenting the fundamentals and background knowledge with respect to formal methods and security protocol analysis. Chapter 2 provides an overview of related work in this area, including basic concepts and terminology. Chapters 3 and 4 show a logical framework and a model checker for analyzing secure transaction protocols. Chapter 5 explains how to deal with uncertainty issues in secure messages, including inconsistent messages and [detailed...]

ISBN: 3540850732
Book size: ; Page extent: 234.

 

PUT TO
THE BASKET
Martin Stone, Spencer Strauss
Secure Your Financial Future Investing in Real Estate

y.
Publisher:
Description: Property ownership can create a comfortable retirement income. Stock market volatility is causing people to examine different investment options, and real estate is emerging as a leading choice. Learn how to create a fulfilling, predictable,and prosperous nest egg. Secure Your Financial Future Investing in Real Estate , by two leading practitioners, Martin Stone and Spencer Strauss, presents time tested principles of planning, appraising, financing, purchasing and managing almost every type of profitable real estate investment. Secure Your Financial Future Investing in Real Estate advises readers how to build a retirement portfolio using techniques such as leverage, compound interest, and tax deferred exchanges. The authors believe that anyone who uses the moneymaking techniques can safely and successfully create a fulfilling, wealthy, and abundant retirement. [detailed...]

ISBN: 0793161290
Book size: ; Page extent: .

 

PUT TO
THE BASKET
James Winter
Secure from Rash Assault: Sustaining the Victorian Environment

y.
Publisher:
Description: Nineteenth-century Britain led the world in technological innovation and urbanization, and unprecedented population growth contributed as well to the `rash assault,` to quote Wordsworth, on Victorian countrysides. Yet James Winter finds that the British environment was generally spared widespread ecological damage. Drawing from a remarkable variety of sources and disciplines, Winter focuses on human intervention as it not only destroyed but also preserved the physical environment. Industrial blight could be contained, he says, because of Britain`s capacity to import resources from elsewhere, the conservative effect of the estate system, and certain intrinsic limitations of steam engines. The rash assault was further blunted by traditional agricultural practices, preservation of forests, and a growing recreation industry that favored beloved landscapes. Winter`s illumination of Victorian attitudes toward the exploitation of natural resources offers a valuable preamble [detailed...]

ISBN: 0520229304
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Carl F. Endorf
Secured Computing: A SSCP Study Guide

y.
Publisher:
Description: The Systems Security Certified Professional (SSCP) designation is one of the most respected certifications an IT professional can obtain during their career. It demonstrates the ability to understand a broad range of security concerns in many areas of the security profession. This is the ultimate guide for the Systems Security Certified Professional (SSCP) Exam. It is designed for the experienced Security Professional. This guide will help to supplement your studies and further your goal of acquiring the SSCP designation. The book is designed for a security professional by a security professional. The author has strived to take the information that is needed to be successful in the security arena and to condense it into one concise volume. In addition, this book is also a great resource for anyone interested in getting a better hndle on how to secure ones organization and enterprise. This guide will help you to understand the common body of knowledge that is set forth by [detailed...]

ISBN: 1553691881
Book size: ; Page extent: .

 

PUT TO
THE BASKET
IBM Redbooks
Secured Single Signon in a Client/Server Environment

y.
Publisher:
Description: [detailed...]

ISBN: 0738406090
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Henry J. Bailey, Richard B. Hagedorn
Secured Transactions in a Nutshell Nutshell Series) (4th ed)

y.
Publisher:
Description: The new version of UCC (Uniform Commercial Code) Article 9 on secured transactions is significantly different from the prior version. To date, 17 states have enacted the 1999 version. The text also contains extensive coverage of the prior version becausethe majority of states have not yet adopted the new one. Also provides an overview of the security agreement, relationship of parties prior to default, perfection of security interest, bankruptcy, and the enforcement of security interest. [detailed...]

ISBN: 0314238174
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Christopher Wells
Securing Ajax Applications: Ensuring the Safety of the Dynamic Web

2007 y.
Publisher:
Description: Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur. Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your customers. This book presents basic security techniques and examines vulnerabilities with JavaScript, XML, JSON, Flash, and other technologies -- vital information that will ultimately save you time and money. [detailed...]

ISBN: 0596529317
Book size: ; Page extent: 400.

 

PUT TO
THE BASKET
Peter R., MBA Ramsaroop
Securing Business Intelligence: Knowledge and CyberSecurity in the Post 9/11 World

2004 y.
Publisher:
Description: Book DescriptionThis book provides business and government leaders a new way of thinking about security and information. Securing Business Intelligence identifies the changing way of thinking required by our new security needs and provides a compelling model for viewing security within a broader conceptual framework including innovative content/knowledge management practices. Can your organization be attacked? Before the events of September 11, most organizations might have answered, no. Since then, this message has been reinforced by intellectual property loss, natural disasters, and power outages. Recent events brought with it the near-universal realization that tighter network security, backup networks, increased security in knowledge management and the creation of disaster recovery architecture are absolute requirements. Securing business intelligence is the vital key to survival and success in our brave new world. And so, in response to those events, industry and [detailed...]

ISBN: 0972824715
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Jonathan S. Held, John R. Bowers
Securing E-Business Applications and Communications

y.
Publisher:
Description: Take a walk through the process of setting up a secure E-commerce Web site with Securing E-Business Applications and Communications. In this book, you get a brief but comprehensive look at the fundamental and important cornerstones of E-commerce: from the basics of security to the development and implementation of an actual E-commerce site. Written with the heterogeneous network in mind, it includes implementation examples for Unix (Solaris and Linux), Windows NT 4.0, and Windows 2000. The authors pay particular attention to the security issues involved. They also highlight the plethora of encryption algorithms that are instrumental in securing data. Rather than burden you with the intimate details of these algorithms, the authors cover `the pieces` thatso many other texts miss. Together, you and the authors develop a site from concept to implementation. Numerous coding examples illustrate the how-tos of the most current technologies - from Microsoft, Sun, and others - to support [detailed...]

ISBN: 0849309638
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Timothy Braithwaite
Securing E-Business Systems: A Guide for Managers and Executives

y.
Publisher:
Description: `This is a must-read for the entire CXO community if businesses are to survive in cyberspace. Attack methodologies and the cyber threat poised against our business systems are advancing rapidly. Business leaders are soon to face downstream liability issues for the damage their unprotected and exploited systems cause not only to themselves but to all of those with whom they do business in cyberspace. American businesses are now the target of choice by our nations enemies. We may secure the airways, ports,and borders, but only the boardrooms of America can ensure the survival of our economy.` ?John R. Thomas, Colonel, U.S. Army, Retired, Former Commander of the DoD, Global Operations and Security Center Todays e-business depends on the securityof its networks and information technology infrastructure to safeguard its customers and its profits. But with rapid innovation and the emergence of new threats and new countermeasures, keeping up with security is becoming more complex [detailed...]

ISBN: 0471072982
Book size: ; Page extent: .

 

PUT TO
THE BASKET
David M. De Ferranti, Guillermo Perry
Securing Our Future in a Global Economy

y.
Publisher:
Description: [detailed...]

ISBN: 0821347306
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Dan Kroll
Securing Our Water Supply: Protecting a Vulnerable Resource

2006 y.
Publisher:
Description: Water is our lifeline, and ensuring its security is a top priority. Thousands of water facilities, including reservoirs, wells and treatment plants work efficiently, and quietly, but even a small attack could have disastrous effects for a community, or even an entire state. Securing Our Water Supply: Protecting a Vulnerable Resource gives a unique look at protecting all types of facilities, equipment, assets and the general population. Author Dan Kroll presents a basic primer of the threats to our water infrastructure and the steps to prevent such an event. Benefits for readers: An understanding of the vulnerabilities in the water supply, countermeasures to prevent and respond to an attack on a water facility, and, considerations for accidental or naturally occurring water contamination. [detailed...]

ISBN: 1593700695
Book size: ; Page extent: 200.

 

PUT TO
THE BASKET
Michael Sheehan
Securing Outer Space: International Relations Theory and the Politics of Space (Routledge Critical Security Studies)

2009 y.
Publisher:
Description: The challenges that space poses for political theory are profound. Yet until now, the exploration and utilization of space has generally reflected - but not challenged - the political patterns and impulses which characterized twentieth-century politics and International Relations. This edited volume analyses a number of controversial policies, and contentious strategies which have promoted space activities under the rubric of exploration and innovation, militarization and weaponization, colonization and commercialization. It places these policies and strategies in broader theoretical perspective in two key ways. Firstly, it engages in a reading of the discourses of space activities: exposing their meaning-producing practices, uncovering the narratives which convey certain space strategies as desirable, inevitable and seamless. Secondly, the essays suggest ways of understanding, and critically engaging with, the effects of particular space policies.The essays here seek to `bring back [detailed...]

ISBN: 0415460565
Book size: ; Page extent: 272.

 

PUT TO
THE BASKET
Paul Osterman
Securing Prosperity: The American Labor Market: How It Has Changed and What to Do About It

y.
Publisher:
Description: We live in an age of economic paradox. The dynamism of America`s economy is astounding--the country`s industries are the most productive in the world and spin off new products and ideas at a bewildering pace. Yet Americans feel deeply uneasy about their economic future. The reason, Paul Osterman explains, is that our recent prosperity is built on the ruins of the once reassuring postwar labor market. Workers can no longer expect stable, full-time jobs and steadily rising incomes. Instead, they face stagnant wages, layoffs, rising inequality, and the increased likelihood of merely temporary work. In Securing Prosperity , Osterman explains in clear, accessible terms why these changes have occurred and lays out an innovative plan for new economic institutions that promises a more secure future. Osterman begins by sketching the rise and fall of the postwar labor market, showing that firms have been the driving force behind recent change. He draws on original surveys of nearly [detailed...]

ISBN: 0691086885
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Ronald L. Krutz
Securing SCADA Systems

2005 y.
Publisher:
Description: Bestselling author Ron Krutz once again demonstrates his ability to make difficult security topics approachable with this first in-depth look at SCADA (Supervisory Control And Data Acquisition) systems Krutz discusses the harsh reality that natural gas pipelines, nuclear plants, water systems, oil refineries, and other industrial facilities are vulnerable to a terrorist or disgruntled employee causing lethal accidents and millions of dollars of damage-and what can be done to prevent this from happening Examines SCADA system threats and vulnerabilities, the emergence of protocol standards, and how security controls can be applied to ensure the safety and security of our national infrastructure assets [detailed...]

ISBN: 0764597876
Book size: ; Page extent: 218.

 

PUT TO
THE BASKET
Gavin Cawthra
Securing South Africa`s Democracy: Defense, Development and Security in Transition (International Political Economy Series)

y.
Publisher:
Description: This book examines the defence and security challenges facing the new South Africa in the context of development and nation-building priorities. The transformation of security policy during the transition from apartheid and since the April 1994 elections is examined. Challenges facing the defence force and the police service are examined and the relationships between defence, development and domestic and external security are explored in an integrated way which points to a policy framework for security in the developing world. [detailed...]

ISBN: 0312174195
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Peter Thermos, Ari Takanen
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

2007 y.
Publisher: Addison-Wesley Professional
Description: In `Securing VoIP Networks`, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud, and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols, and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and [detailed...]

ISBN: 0321437349
Book size: ; Page extent: 384.

 

PUT TO
THE BASKET
Stefan Norberg
Securing Windows NT/2000 Servers for the Internet

y.
Publisher:
Description: In recent years, Windows NT and Windows 2000 systems have emerged as viable platforms for Internet servers. More and more organizations are now entrusting the full spectrum of business activities--including e-commerce--to Windows. Unfortunately, the typical Windows NT/2000 installation makes a Windows server an easy target for attacks, and configuring Windows for secure Internet use is a complex task. Securing Windows NT/2000 Servers for the Internet suggests a two-part strategy to accomplish the task: `Hardening` any Windows server that could potentially be exposed to attacks from the Internet, so the exposed system (known as a `bastion host`) is as secure as it can be. Providing extra security protection for exposed systemsby installing an additional network (known as a `perimeter network`) that separates the Internet from an organization`s internal networks. Securing Windows NT/2000 Servers for the Internet is a concise guide that pares down [detailed...]

ISBN: 1565927680
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Michael A. Simonyi
Securing Windows NT/2000: From Policies to Firewalls

y.
Publisher:
Description: In today`s business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization. The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The book includes the steps required to define a corporate security policy, how to implement that policy, and how to structure the project plan. Tables, charts, and work templates provide a starting point to begin assessing and implementing a solution that will fit the unique needs of your organization. Part two provides the reader with practical hands-on applications for the preparation, installation, and [detailed...]

ISBN: 0849312612
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Betty Meredith
Securing Your Financial Future

y.
Publisher:
Description: This self-study book is a step-by-step program to help you make more informed investing and retirement planning decisions with yor 401(k) dollars. [detailed...]

ISBN: 0970222017
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Mark Lee
Securing Your PC in Easy Steps (In Easy Steps)

2007 y.
Publisher:
Description: - [detailed...]

ISBN: 1840783362
Book size: ; Page extent: 192.

 

PUT TO
THE BASKET
Bill Griffith Jr. CFP
Securing a Retirement Income for Life

2006 y.
Publisher:
Description: How much you need to finance your retirement depends on how well you want to live and the expected length of your retirement life. Do you want to maintain or increase your standard of living? Do you want to start a new business, provide financial help to family members or engage in a new hobby or activity? How much you need to accumulate depends on the lifestyle you envision. Securing a Retirement Income for Life will show you how much you need to accumulate to provide a retirement income for life and how to implement the very best strategies for managing, protecting and preserving your wealth. The interactive nature of this new book will show you how to go about planning to meet your retirement needs and objectives and how best to prepare for uncertainties when the future is unknown. For many people, retirement may represent the longest stage of their life. It is a time when they can look forward to a whole new range of exciting challenges and activities - to experience [detailed...]

ISBN: 0978550609
Book size: ; Page extent: 212.

 

PUT TO
THE BASKET
Peter T. Davis
Securing and Controlling Cisco Routers

y.
Publisher:
Description: Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations. [detailed...]

ISBN: 0849312906
Book size: ; Page extent: .

 

PUT TO
THE BASKET
Сайт создан в системе uCoz