Filter By
- Book
- Qty in Cart
- Quantity
- Price
- Subtotal
-
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts by Derrick Rountree 9781597495943
£17.79Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. ... -
Client-Side Attacks and Defense by Sean Philip Oriyano 9781597495905
£23.97Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation,... -
Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments by Diane Barrett 9781597495578
£39.99Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics... -
Seven Deadliest Network Attacks by Stacy J. Prowell 9781597495493
£17.25Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most... -
Seven Deadliest Unified Communications Attacks by Dan York 9781597495479
£13.28Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more... -
Seven Deadliest Web Application Attacks by Mike Shema 9781597495431
£17.25Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out... -
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization by Thomas Olzak 9781597494311
£24.57Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a... -
Eleventh Hour Network+: Exam N10-004 Study Guide by Naomi Alpern 9781597494281
£12.00Eleventh Hour Security+: Exam SY0-201 Study Guide offers a practical guide for those preparing for the CompTIA Network+ exam. The book's 10 chapters provide in-depth discussions of the following topics: network fundamentals; network media; network... -
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting by John Hoopes 9781597493055
£39.99One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size... -
Mobile Malware Attacks and Defense by Ken Dunham 9781597492980
£39.99Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian... -
E-discovery: Creating and Managing an Enterprisewide Program: A Technical Guide to Digital Investigation and Litigation Support by Karen A. Schuler 9781597492966
£51.33One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann... -
GFI Network Security and PCI Compliance Power Tools by Brien Posey 9781597492850
£42.19Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new... -
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices by Joey Hirao 9781597492843
£47.85Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and... -
Securing Citrix XenApp Server in the Enterprise by Tariq Azad 9781597492812
£42.79Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make... -
Integrating ISA Server 2006 with Microsoft Exchange 2007 by Fergus Strachan 9781597492751
£34.75This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and... -
The Best Damn Windows Server 2008 Book Period by Anthony Piltzecker 9781597492737
£41.19Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization... -
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices by Max Schubert 9781597492676
£34.75The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details... -
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century by Christopher Burgess 9781597492553
£47.85The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United... -
Check Point NGX R65 Security Administration by Ralph Bonnell 9781597492454
£39.99Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN... -
Microsoft Forefront Security Administration Guide by Jesse Varsalone 9781597492447
£27.85Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no... -
Nmap in the Enterprise: Your Guide to Network Scanning by Angela Orebaugh 9781597492416
£41.79Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate... -
How to Cheat at Deploying and Securing RFID by Frank Thornton 9781597492300
£34.75RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and... -
The Best Damn Exchange, SQL and IIS Book Period by Henrik Walther 9781597492195
£38.56Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows... -
The Best Damn Firewall Book Period by Thomas W. Shinder 9781597492188
£41.19The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point. Compiled from the best of the Syngress firewall library and... -
How to Cheat at Administering Office Communications Server 2007 by Anthony Piltzecker 9781597492126
£27.19Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM),... -
Dr. Tom Shinder's ISA Server 2006 Migration Guide by Thomas W. Shinder 9781597491990
£34.48Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of... -
Open Source Fuzzing Tools by Noam Rathaus 9781597491952
£41.79Fuzzing is often described as a "black box" software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program... -
How to Cheat at Configuring VmWare ESX Server by David Rule 9781597491945
£26.59A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use... -
Microsoft Vista for IT Security Professionals by Anthony Piltzecker 9781597491396
£29.17Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn... -
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors by Anthony Reyes 9781597491334
£39.99Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The book begins with the chapter "What is Cyber Crime?" This introductory chapter describes the most common... -
Kismet Hacking by Frank Thornton 9781597491174
£37.84Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in... -
Dictionary of Information Security by Robert Slade 9781597491150
£16.18The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will find this a handy reference to help them identify... -
OS X for Hackers at Heart by Bruce Potter 9781597490405
£33.00The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker's eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the... -
How to Cheat at Managing Windows Server Update Services: Volume 1 by B. Barber 9781597490276
£22.27Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set... -
Cyberwar and Revolution: Digital Subterfuge in Global Capitalism by Nick Dyer-Witheford 9781517904104
£78.08Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear... -
Secure Key Establishment by Kim-Kwang Raymond Choo 9781441946898
RRP: £109.99£96.35Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure... -
Fifth World Conference on Information Security Education: Proceedings of the IFIP TC 11 WG 11.8, WISE 5, 19 to 21 June 2007, United States Military Academy, West Point, NY, USA by Lynn Futcher 9781441944580
RRP: £54.99£48.69The International Federation for Information Processing (IFIP) series publishes state-of-the-art results in the sciences and technologies of information and communication. The IFIP series encourages education and the dissemination and exchange of... -
New Approaches for Security, Privacy and Trust in Complex Environments: Proceedings of the IFIP TC 11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa by Hein Venter 9781441944337
RRP: £109.99£98.28The current IT environment deals with novel, complex approaches such as information privacy, trust, digital forensics, management, and human aspects. This volume includes papers offering research contributions that focus both on access control in complex... -
Handbook of Database Security: Applications and Trends by Michael Gertz 9781441943057
RRP: £119.99£107.17Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security... -
Advances in Digital Forensics II by Martin S. Olivier 9781441942326
RRP: £109.99£97.17Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Practically every crime now involves some digital evidence; digital forensics provides the techniques and tools to articulate this...