-
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Author Aviel D. Rubin , Steven M. Bellovin , William R. Cheswick
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the sec....
Release Date 2003/02 -
Auditing Information Systems, Second Edition
Author Jack J. Champlain
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing compu....
Release Date 2003/02 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
The Practice of Network Security: Deployment Strategies for Production Environments
Author Allan CISSP Liska
Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and fo....
Release Date 2002/12 -
Author Roberta Bragg - CISSP
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multip....
Release Date 2002/11 -
Author Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protoc....
Release Date 2002/10 -
Advanced CISSP Prep Guide: Exam Q&A
Author Russell Dean Vines , Ronald L. Krutz
Get ready to pass the CISSP exam and earn your certification with this advanced test guideUsed alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the hel....
Release Date 2002/10 -
Newnes Guide to Digital TV, 2nd Edition
Author Richard Brice
The second edition has been updated with all the key developments of the past three years, and includes new and expanded sections on digital video interfaces, DSP, DVD, video servers, automation systems, HDTV, 8-VSB modulation and the ATSC system. Richard Bric....
Release Date 2002/10 -
SyncML®: Synchronizing and Managing Your Mobile Data
Author Phillipe Kahn , Peter Thompson , Apratim Purakayastha , Riku Mettälä , Uwe Hansmann
Discover SyncML, the new global standard for synchronizing virtually any mobile deviceCovers both the technical and business issuesCovers personal and enterprise applications, new mobile services, security, device management, and moreIncludes practical guidance for ....
Release Date 2002/09 -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Maximum Accessibility: Making Your Web Site More Usable for Everyone
Author Ph.D. John M. Slatin , Sharron Rush
Accessibility is now a legal requirement for all national government Web sites in the U.S., Canada, Australia, and the European Union. Throughout the world, many other organizations--universities, schools, and private companies--are recognizing that accessibility is....
Release Date 2002/09 -
Author Lance Spitzner
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he....
Release Date 2002/09 -
Pause & Effect: The Art of Interactive Narrative
Author Mark Stephen Meadows
Interactive narrative is the cornerstone for many forms of digital media: web sites, interface design, gaming environments, and even artificial intelligence. In Pause & Effect, Mark Stephen Meadows examines the intersection of storytelling, visual art, and inter....
Release Date 2002/09 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
From Idiocy to Mental Deficiency
Author David Wright , Anne Dig
From Idiocy to Mental Deficiency is the first book devoted to the social history of people with learning disabilities in Britain. Approaches to learning disabilities have changed dramatically in recent years. The implementation of 'Care in the Community', the camp....
Release Date 2002/09 -
Author Chris P. Underwood
This important new book bridges the gap between works on classical control and process control, and those dealing with HVAC control at a more elementary level, which generally adopt a qualitative and descriptive control. Both advanced level students and specialist p....
Release Date 2002/09 -
Web Hacking: Attacks and Defense
Author Shreeraj Shah , Saumil Shah , Stuart McClure
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, paymen....
Release Date 2002/08 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Author Pravir Chandra , Matt Messier , John Viega
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol fo....
Release Date 2002/06 -
Managing Cisco Network Security, 2nd Edition
Author Syngress
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Sy....
Release Date 2002/05 -
Network Security: Private Communication in a Public World, Second Edition
Author Charlie Kaufman , Radia Perlman , Mike Speciner
The classic guide to network security—now fully updated!"Bob and Alice are back!"Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanati....
Release Date 2002/04 -
Free as in Freedom [Paperback]
Author Sam Williams
Free as in Freedom interweaves biographical snapshots of GNU project founder Richard Stallman with the political, social and economic history of the free software movement. It examines Stallman's unique personality and how that personality has been at turns a drivi....
Release Date 2002/03 -
Hack Proofing Your Network, 2nd Edition
Author Syngress
A new edition the most popular Hack Proofing book around!IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topi....
Release Date 2002/03 -
Hack I.T.: Security Through Penetration Testing
Author Ajay Gupta , Scott Laliberte , T. J. Klevinsky
"This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previousl....
Release Date 2002/02 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
IP SANs: A Guide to iSCSI, iFCP, and FCIP Protocols for Storage Area Networks
Author Tom Clark
"A concise guide to an exciting new technology that is bringing SANs into mainstream IP networking."--Jayshree Ullal, Group Vice President/General Manager, Cisco Systems"IP SANs provides a comprehensive overview of the next-generation storage area networks, with con....
Release Date 2001/11 -
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Author Russell Shumway , Dr. Eugene E. Schultz
This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with a....
Release Date 2001/11