BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Digital Business & Culture - Privacy

1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$32.99
1. File System Forensic Analysis
$60.00
2. Cisco ASA and PIX Firewall Handbook,
$29.69
3. Rootkits: Subverting the Windows
$37.34
4. IPv6 Essentials
$55.73
5. Cisco ASA: All-in-One Firewall,
$16.29
6. How to Be Invisible: The Essential
$32.99
7. Hacking Exposed 5th Edition (Hacking
$61.50
8. The Complete Cisco VPN Configuration
$31.50
9. Practical Cryptography
$34.39
10. Cryptography Decrypted
$32.99
11. Counter Hack Reloaded: A Step-by-Step
$37.79
12. Microsoft Internet Security and
$32.97
13. Stealing the Network: How to Own
$22.04
14. How to Break Web Software: Functional
$26.37
15. The CSS Anthology: 101 Essential
$37.79
16. MCSA/MCSE Self-Paced Training
$26.37
17. Hacking: The Art of Exploitation
$55.00
18. Security Threat Mitigation and
$25.19
19. Managing Enterprise Content: A
$45.64
20. RFID: Applications, Security,

1. File System Forensic Analysis
by Addison-Wesley Professional
Paperback (17 March, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0321268172
Sales Rank: 14172
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (19)

5-0 out of 5 stars Accept no substitutes -- THE book to read on file systems
I decided to read and review three digital forensics books in order to gauge their strengths and weaknesses: "File System Forensic Analysis" (FSFA) by Brian Carrier, "Windows Forensics" (WF) by Chad Steel, and "EnCase Computer Forensics" (ECF) by Steve Bunting and William Wei.All three books contain the word "forensics" in the title, but they are very different.If you want authoritative and deeply technical guidance on understanding file systems, read FSFA.If you want to focus on understanding Windows from an investigator's standpoint, read WA.If you want to know more about EnCase (and are willing to tolerate or ignore information about forensics itself), read ECF.
5-0 out of 5 stars The best work on the topic
Carrier's book has prooven invaluable to this digital forensics trainee, and I expect many of the old hands in the field will be keeping it on hand as well.If you're serious about computer forensics, you need a copy.

4-0 out of 5 stars Very deep
I'm pretty technical, so I enjoyed this book.The author has more on file systems than just about anywhere, and I found it helpful in non security work also just to understand how the different systems work.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Data Security    4. Computer security    5. Computers    6. Data structures (Computer science)    7. File organization (Computer science)    8. Internet - Security    9. Security - General    10. Computers / Internet / Security    11. Computing and Information Technology   


2. Cisco ASA and PIX Firewall Handbook, First Edition
by Cisco Press
Paperback (07 June, 2005)
list price: $60.00 -- our price: $60.00
(price subject to change: see help)
Isbn: 1587051583
Sales Rank: 17696
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (14)

5-0 out of 5 stars Complement to other sources available
I think author did a wonderful job filling in where other popular litrature about PIX left off.I read the CCSP book, and leared alot.This book filled in stuff that CCSP book just does not talk about.Not to knock the CCSP book; each auther can only fill in so much.It is a difficult decision on what to keep and what to leave off.I find the PIX and ASA book is very practical.If you want a good understanding of this platform, then you want this book as the pliers in your tool box of knowledge.Do not expect it to be swiss army tool though.I think author was especially considerate to the reader's needs to publish items that other litrature just does not cover.There is alot of good information.Nice pictures which addressed questions I had and even posted to some CCIE sites and there was no answer.Definately worth buying.

3-0 out of 5 stars Very little on ASA
This book is very helpful for PIX firewalls, but is mislabeled for ASA. There is very little on the ASA product. Usually just a mention of command differences between ASA and PIX. If you are looking for a book on ASA do not buy this book.

5-0 out of 5 stars One point makes this book a must have
Most commands explained have three lines:
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Internet - Security    7. Security    8. Security - General    9. Computers / Internet / Security    10. Network security   


3. Rootkits: Subverting the Windows Kernel
by Addison-Wesley Professional
Paperback (22 July, 2005)
list price: $44.99 -- our price: $29.69
(price subject to change: see help)
Isbn: 0321294319
Sales Rank: 5370
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (16)

5-0 out of 5 stars Welcome to the future
If you don't own this book, then the world will one day 0wn you.Buy this book today and learn from the masters about the ultimate tool in the attacker's toolkit.Greg Hoglund's work is essential to computer security.It behooves us all to understand it.
5-0 out of 5 stars Rootkit insights
One of the first books to go deeper in to rootkits of its kind.Not many books out there to give a understanding to IAT, SSDT, hooks, trampoline functions, and its relationship to rootkits.
3-0 out of 5 stars Not a book for Kernel Driver Developer
This book tells me what RootKit really means. One useful thing I got from this book was that in Windows Kernel even simple code can be used against security. And that's it. Most techniques in this book are primitive to kernel developers. I don't recommend this book to serious kernel driver developers. "Windows Internals" and OSR Online should be the way to go. ... Read more

Subjects:  1. Access control    2. Computer - Internet    3. Computer Books: Internet General    4. Computer Data Security    5. Computer security    6. Computers    7. Internet - Security    8. Microcomputer Operating Environments    9. Computers / Internet / Security    10. Data security & data encryption    11. Network security   


4. IPv6 Essentials
by O'Reilly Media
Paperback (17 May, 2006)
list price: $44.99 -- our price: $37.34
(price subject to change: see help)
Isbn: 0596100582
Sales Rank: 10842
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (12)

5-0 out of 5 stars VERY VERY HIGHLY RECOMMENDED!!
Are you interested in wanting to understand and implement the IPv6 protocol! If you are, then this book is for you. Author Silvia Hagen, has done an outstanding job of writing a book that covers IPv6 in detail and explains all of the new features and functions.
5-0 out of 5 stars Excellent discussion of IPv6 protocols
I read and reviewed "IPv6 Network Administration" (INA) in August 2005 and "Running IPv6" (RI) in January 2006.I gave those books 5 stars, so I had high expectations for "IPv6 Essentials, 2nd Ed" (IE2E).INA and RI are very hands-on, implementation-specific books.IE2E is more concerned with explaining protocols and IPv6 features.In this respect, IE2E is the perfect complement to INA and RI.
5-0 out of 5 stars Excellent 2nd edition contains lots of practical information
Internet Protocol version 6 (IPv6) is a network layer standard used by electronic devices to exchange data across a packet-switched internetwork and is intended to provide more addresses for networked devices, allowing, for example, each cell phone and mobile electronic device to have its own address. IPv6 is actually capable of supporting5×10^28 addresses for each of the roughly 6.5 billion people alive today.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Networks    4. Computers    5. Computers - Communications / Networking    6. Internet - General    7. Internet - Security    8. Networking - Network Protocols    9. Computer / Internet    10. Computers / Networking / Network Protocols    11. Computers/Internet - General    12. Networking standards & protocols    13. TCP/IP (Computer network protocol)    14. ipv6, network, internet, protocol   


5. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
by Cisco Press
Paperback (14 October, 2005)
list price: $70.00 -- our price: $55.73
(price subject to change: see help)
Isbn: 1587052091
Sales Rank: 18217
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Good reference
This book helped me a lot. I recently deployed over 250 ASAs and was running into a lot of problems with the IPS SSM and VPN features. I got most of my answers from this book.

1-0 out of 5 stars Very Amatuer
What a waste of time it was reading this book. If you are not very familiar with FW/IPS or VPN then this may be helpful, but if you have been working with this technology and Cisco's products that address these technologies (ASA, PIX, IPS, VPN3k) then please don't refer to this joke. Go online to cisco.com and do the research. Sometimes it felt as if whitepapers were copied and pasted.
5-0 out of 5 stars Excellent Book on Cisco ASA.
I bought this book 2 weeks back for an ASA project that my company is going to deploy. I am really amused to see that each chapter starts off with an in-depth architectural overview of the features to be discussed. It then provides full step-by-step configuration examples with lots of deployment scenarios. It even covers many troubleshooting and monitoring examples that helped me a lot when I started deploying it in my lab network
Read more

Subjects:  1. Certification Guides - Cisco    2. Computer - Internet    3. Computer Books: General    4. Computer Data Security    5. Computer Network Management    6. Computers    7. Internet - Security    8. Networking - General    9. Security - General    10. Computers / Internet / Security    11. Internet    12. Network security   


6. How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
by Thomas Dunne Books
Hardcover (March, 2004)
list price: $23.95 -- our price: $16.29
(price subject to change: see help)
Isbn: 0312319061
Sales Rank: 5121
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (32)

3-0 out of 5 stars Outdated. Some examples are not practical
Somewhat outdated.
5-0 out of 5 stars Solid advice from a true believer
I carefully read the first edition of the book approximately 7 years ago.Though I didn't perceive at the time that I had a need for "invisibility", I adopted several of the recommendations in the book simply because they made me feel more comfortable.I was subsequently harrassed by a disgruntled former employee.At least one overt act of his was thwarted by my privacy measures.How many others, I'll never know.Every bit of energy and money I'd invested in my privacy was paid back and then some.
5-0 out of 5 stars Excellent book on Privacy Techniques!
This is an excellent book on privacy techniques.What I like about it is that JJ Luna discusses various levels of privacy, and I have found that the more privacy you want, the more time/effort you will have to go through to maintain it.He talks about how to go about receiving your mail, where to choose to live, how use the phone, how to pay people, and how to title assets more privately.I like this book because JJ Luna does not try to force a one size fits all agenda upon people, but lets the reader decide on what level of privacy is right for them. There are varying levels of privacy which can be obtained for each one, depending on your circumstances (e.g. family, job, etc).Of course, the more privacy you want, the more you will have to sacrifice, but most of these techniques are simple and won't take too much extra time out of your week.
Read more

Subjects:  1. Business & Economics    2. Computer security    3. Identification    4. Personal Finance    5. Personal Finance - General    6. Political Freedom & Security - Civil Rights    7. Politics / Current Events    8. Privacy, Right of    9. Right of privacy    10. United States   


7. Hacking Exposed 5th Edition (Hacking Exposed)
by McGraw-Hill Osborne Media
Paperback (19 April, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072260815
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

A lot of computer-security textbooks approach the subject from adefensive point of view. "Do this, and probably you'll survive a particular kindof attack," they say. In refreshing contrast, Read more

Reviews (82)

5-0 out of 5 stars Information Security
I had to purchase this book for college but it is a great read. One of the only textbooks that I have used that was actually interesting. They give clear examples and make it easy to follow thier explanations. Great book if you want to learn about hacking and some of the issues it involves.

3-0 out of 5 stars Still solid but redundant and a bit tired
I cannot say anything more that other positive reviews have not already said.
3-0 out of 5 stars Good, but aging
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Computer Security    7. Data protection    8. Internet - Security    9. Networking - General    10. Security - General    11. Security measures    12. Computer Communications & Networking    13. Computer fraud & hacking    14. Computers / Security    15. Data security & data encryption   


8. The Complete Cisco VPN Configuration Guide
by Cisco Press
Paperback (15 December, 2005)
list price: $75.00 -- our price: $61.50
(price subject to change: see help)
Isbn: 1587052040
Sales Rank: 20733
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars Excellent resource for security professionals
Richard Deal's book, The Complete Cisco VPN Configuration Guide, sets out to provide a comprehensive reference for networking professionals designing, deploying, and managing VPN solutions.This book covers the foundational information as well as step by step guides to configuring VPN solutions on Cisco VPN Concentrators, software and hardware clients, Cisco IOS routers, and Cisco PIX and ASA appliances.
5-0 out of 5 stars The Best Cisco VPN Configuration Book
Richard Deal's "The Complete Cisco VPN Configuration Guide" provides a complete step by step guide on how to configure VPN on Cisco Concentrators, software (including Windows VPN client) and hardware client, IOS routers, PIX and ASA security appliances.
4-0 out of 5 stars A useful read for security professionals
A thorough and complete review of VPN technologies, as implemented in Cisco infrastructure,Deal's `The Complete Cisco VPN Configuration Guide', is arranged as a twenty three chapter step by step technology review and one chapter of bonus case studies.
Read more

Subjects:  1. Computer - Internet    2. Computer Architecture    3. Computer Architecture - General    4. Computer Books: General    5. Computers    6. Internet - Security    7. Networking - Intranets & Extranets    8. Computers / Internet / Security    9. Network security   


9. Practical Cryptography
by Wiley
Paperback (28 March, 2003)
list price: $50.00 -- our price: $31.50
(price subject to change: see help)
Isbn: 0471223573
Sales Rank: 55997
Average Customer Review: 3.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (15)

3-0 out of 5 stars Biased to Schneier's algorithms
This can be an annoying book for a serious developer, but I do know Writing a secure cryptosystem is very hard. People should be aware that it is hard, and they are likely to make mistakes. It isn't something that should be attempted lightly. If you are doing some actual work, it's not a good one. The book does not cover sufficient mathematic knowledge, and the edit is bit horrible as well. The authors chose to support their own algorithm shedding less light on AES and even RSA. That really made me stop reading this book.
3-0 out of 5 stars Self contradictory and selflauding
From the very first pages, authors emphasize the need for public algorithms and peer review. Yet, the book is full of suggestions that appear first time in the book. They even take time to give fancy names to their new proposals. It is typical to see things like "While writing this chaper we came up with this new random number generator...". Well, the authors could have used some of public scrutiny they are so fond of.
3-0 out of 5 stars Must be used with Applied Cryptography
As one other reader pointed out this book can be called Applied Cryptography Light. It is true, it gives you more theory and very little math. I did not like this book by itself since I was interested in actual implementation and i wanted to see full algorithms and math. I did end up buying Applied Cryptography and those 2 books combined provide an excellent reference. I was not able to give more than 3 stars since I did not feel i got any knowledge out of this book to be able to apply it in real life except reading: "Cryptography is hard, you might need to hire an expert..." while I want to become an expert myself one day! ... Read more

Subjects:  1. Computer Books: General    2. Computer security    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Cryptography    7. Internet - General    8. Networking - General    9. Security - General    10. Computers / Security    11. Data security & data encryption    12. Privacy & data protection   


10. Cryptography Decrypted
by Addison-Wesley Professional
Paperback (21 December, 2000)
list price: $39.99 -- our price: $34.39
(price subject to change: see help)
Isbn: 0201616475
Sales Rank: 96835
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (32)

5-0 out of 5 stars Wonderful book explaining all the secret s of secure communication
Cryptography Decrypted is an easy to read and fun book that explains how cryptography has evolved from Caesar's time to now. The author goes over how encryption is used in all areas of communication, and what sequential systems have deveoped to stop hacker attacks along the way. It is detailed but fun to read, and explains how all the enigmatic parts, like Private Keys, Public Keys, Secret Keys, Digital Signatures, SMIME, PGP, RSA, SHA-1 ect. all fit together.
5-0 out of 5 stars Simply THE BEST!!!
This book is phenomenal! I skimmed through countless books on cryptography before I settled on this one. The authors Mel and Baker have the unique ability to make a complex subject like cryptography completely accessible even to the mathematically challenged. This book is a MUST READ! If you work in the IT Security or Network Design field, this book gives you all the background you need to be more effective in your job without having the turgid style of most crypto books. It really does a fantastic job of explaining all the basic building blocks of cryptography as well as suites like SSL and IPSEC in plain everyday language. You will not be disappointed with this book!

5-0 out of 5 stars Good first book on security
Excellent book for people who want to understand in nutshell what security is all about. If you are overwhelmed by several security terms and want to know how things fit in a bigger picture, this is the book for you. ... Read more

Subjects:  1. Computer security    2. Computers    3. Computers - Communications / Networking    4. Cryptography    5. Cryptography/Access Control    6. Language    7. Security - General    8. Coding theory & cryptology    9. Computers / Internet / Security    10. Data security & data encryption    11. Network security   


11. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (Prentice Hall Series in Computer Networking and Distributed Systems)
by Prentice Hall PTR
Paperback (23 December, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0131481045
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Read more

Reviews (33)

5-0 out of 5 stars Counter Hack this Book
Counter Hack
5-0 out of 5 stars highly recommended
I highly recommend Counter Hack Reloaded to anyone who wants to better understand the technical details of computer hacking / security / defense.
5-0 out of 5 stars When the best defense is a good offense
The second edition of Ed Skoudis and Tom Liston's COUNTER HACK RELOADEDreturns a primary system administrator's resource to new levels, continuing the attack on destructive hacks with a counter-hack guide which remains useful because over half the material in this edition has been revamped and updated to reflect the latest hacker techniques. Typical hacker methods and tools are surveyed, new 'anatomy of an attack' analyses are detailed, and even a new section on wireless hacking appears. COUNTER HACK RELOADED: A STEP-BY-STEP GUIDE TO COMPUTER ATTACKS AND EFFECTIVE DEFENSES is one of the best on the market - and a most for any network administrator facing tday's many security challenges. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Data Security    4. Computer networks    5. Computers    6. Data protection    7. Internet - Security    8. Networking - General    9. Security - General    10. Security measures    11. Computers / Internet / Security    12. Databases & data structures    13. Network security   


12. Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Paperback (24 August, 2005)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 067232718X
Sales Rank: 22073
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (4)

4-0 out of 5 stars Well Leashed and Very Useful Installation Guide
The book is poorly named. "Unleashed" suggests to me wild and wonderful things to do with complex features or even tricks and undocumented things. This is definitely a black Labrador on-the-leash kind of book, and it will get an administrator safely across the broad avenue that is an ISA installation. It's a great book in spite of the name.
5-0 out of 5 stars Awesome Book
This is by far the best ISA Server book on the market.
5-0 out of 5 stars Great book on a rising product!
This is THE book if you are looking to learn ISA 2004. It is structured in an easy-to-understand manner for windows admins who are familiar with Windows but may not have been exposed to ISA Server or are upgrading from ISA 2000. All in all this is the only book on the subject you'll need. ... Read more

Subjects:  1. Client-Server Computing - General    2. Computer Books: General    3. Computers    4. Computers - General Information    5. Internet - General    6. Internet - Security    7. Security - General    8. Computers / Client-Server Computing    9. Data security & data encryption    10. Internet    11. Network security   


13. Stealing the Network: How to Own the Box
by Syngress Publishing
Paperback (01 April, 2003)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 1931836876
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Read more

Features

  • Illustrated

Reviews (31)

5-0 out of 5 stars Entertaining in it's own right...
The Stealing the Network series of books is in a catagory on it's own. Thrilling, entertaining, and fun to readjust scratches the surface of these books. I'll recommend this book to anybody, from joe sixpack who only uses the internet for games and pr0n to mitnick himself.
4-0 out of 5 stars Useful, readable illustration of computer security concepts
_Stealing the Network: How to Own the Box_ has 10 stories with a first person narrator, who is either an attacker, or in two cases, a defender.While the characterization isn't up to the standards of (good) commercial fiction* in most cases, it makes the technical medicine go down easier and gives a picture of who and why people do this stuff.That picture is useful in making an abstraction feel more like a concrete threat.
3-0 out of 5 stars Rough writing, but interesting
The writing needs some help -- I understand the newer books are edited by an actual writer to smooth out the prose a bit.
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer networks    4. Computer security    5. Computers    6. Computers - Communications / Networking    7. Internet - Security    8. Networking - General    9. Security measures    10. Computer hackers    11. Computers / Communications / Networking    12. Computers / Networking / General    13. Computers / Security    14. Cyberterrorism    15. Data security & data encryption    16. Security    17. Management Information Systems   


14. How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
by Addison-Wesley Professional
Paperback (02 February, 2006)
list price: $34.99 -- our price: $22.04
(price subject to change: see help)
Isbn: 0321369440
Sales Rank: 10239
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (7)

5-0 out of 5 stars Very informative. If you develop web software it's a must-read
I recently finished reading How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by Mike Andrews and James A. Whittaker. I, like many of you, develop web software for a living. I've always taken security seriously and occasionally sneered when I ran across examples of common mistakes. Having said that, this book was an eye opener for me.
5-0 out of 5 stars Technique after technique that really works
You can't really read a book like this.You read a few pages and prop the book up with a cookbook holder and start typing in the examples.There were a couple I could not duplicate, but almost everything worked as the authors said it would. Great book, or maybe it would be better to say, great tool!
3-0 out of 5 stars Needs a good proofreader
This book is full of useful information couched in terms that even less technical
Read more

Subjects:  1. Computer Books: General    2. Computer Programs Testing    3. Computer networks    4. Computer software    5. Computers    6. Computers - General Information    7. Computers - Languages / Programming    8. Internet - World Wide Web    9. Programming - Quality Assurance & Testing    10. Programming - Systems Analysis & Design    11. Security - General    12. Security measures    13. Testing    14. World Wide Web    15. Computers / Security    16. World Wide Web (WWW)   


15. The CSS Anthology: 101 Essential Tips, Tricks & Hacks
by SitePoint
Paperback (30 November, 2004)
list price: $39.95 -- our price: $26.37
(price subject to change: see help)
Isbn: 0957921888
Sales Rank: 23661
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (27)

5-0 out of 5 stars Excellent CSS Walkthrough Guide
This book is/has become my guide when something just isn't functioning properly or when I don't want to remember some hack. I quickly found myself learning all sorts of best practices, and tips that resulted in many hours shaved off my development time... all of this resulting from this very book.
4-0 out of 5 stars Tips, tricks and hacks
You have to already know and understand CSS. There is a small introduction, but after that, 101 "How do I..?" Perfect book if you are alredy familiar with the subject.

5-0 out of 5 stars Good Book
Very objective reference about CSS. The book has a small introduction on CSS's Structure and part immediately for practical examples.
Read more

Subjects:  1. Cascading style sheets    2. Computer Books: Languages    3. Computers    4. Computers - Computer Security    5. Design    6. Programming Languages - HTML    7. Security - General    8. Web sites    9. CSS, HTML, Web Design, DHTML, Accessibility, Standards Compliance, Web Site    10. Computers / Computer Security    11. Computers / Programming Languages / General    12. Computers / Security    13. HTML   


16. MCSA/MCSE Self-Paced Training Kit (Exam 70-350): Implementing Microsoft Internet Security and Acceleration Server 2004 (Pro-Certification)
by Microsoft Press
Hardcover (13 April, 2005)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 0735621691
Sales Rank: 97946
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (4)

5-0 out of 5 stars MS Security
Very nice book , I recommended it for all specialist in Microsoft networking, and systems.

5-0 out of 5 stars preparing for exam
Very helpful for exam 70-350 and daily tasks as IT Network security administrator.

5-0 out of 5 stars Very good exam and real world based book
I went to the MOC2824B training a few months ago and didn't like it that much. If you, like me go to the official training you will find that is very much alike. But the autors included a lot of real world notes and insights for the exam on the book that you wont find on the MOC manual. Be ready to mount the practices on a virtual machine environment or real one if you have all the hardware, you will have fun anyways. Labs are filled with very usefull skill building exercises that will entertain you and teach you big time what this great product is all about. I passed the exam last week with 894/1000, and I thank not only my experience with the product but also all the good advice from this book. If you are looking to pass the exam, this is your book!! ... Read more

Subjects:  1. Certification Guides - General    2. Certification Guides - MCSE    3. Certification Guides - Msce    4. Computer Books: Languages    5. Computers    6. Computers - Certification    7. Electronic Data Processing    8. Programming - Software Development    9. Software Engineering    10. Tests    11. Computers / General    12. Data security & data encryption    13. Internet   


17. Hacking: The Art of Exploitation
by No Starch Press
Paperback (October, 2003)
list price: $39.95 -- our price: $26.37
(price subject to change: see help)
Isbn: 1593270070
Sales Rank: 36921
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (36)

5-0 out of 5 stars Excellent insight, without being boring
This is an excellent book, and it helped me a lot in understanding the basic techniques of hacking.
5-0 out of 5 stars Awsome Work
This is one of thosw rear books that get five stars from me. The book is very straigntforward: it is short, it is free of unnecessary explanations, it is pretty detailed and well organized. The book assumes you know quite a bit about computers in general and low-level OS organization in particular. It gives a plethora of interesting examples to try out, so even if you're not particularly interested in the low-level detailes of how a certain trick works, you still remain in the zone by simply applying those examples.
5-0 out of 5 stars this is great stuff
not for total beginners though. author recommends having a gentoo setup. ... Read more

Subjects:  1. Computer Books: General    2. Computer hackers    3. Computer networks    4. Computer security    5. Computers    6. Computers - Computer Security    7. Internet - Security    8. Security - General    9. Security measures    10. Computers / Computer Security    11. Computers / Security    12. Data security & data encryption    13. Security   


18. Security Threat Mitigation and Response: Understanding Cisco Security MARS
by Cisco Press
Paperback (28 September, 2006)
list price: $55.00 -- our price: $55.00
(price subject to change: see help)
Isbn: 1587052601
Sales Rank: 26065
US | Canada | United Kingdom | Germany | France | Japan

Subjects:  1. Computer Books: Internet General    2. Computers    3. Computers - Computer Security    4. Internet - Security    5. Security - General    6. Computers / Internet / Security    7. Network security   


19. Managing Enterprise Content: A Unified Content Strategy
by New Riders Press
Paperback (17 October, 2002)
list price: $39.99 -- our price: $25.19
(price subject to change: see help)
Isbn: 0735713065
Sales Rank: 53299
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (19)

4-0 out of 5 stars Review of Managing Enterprise Content: A Unified Content Str
Are you overwhelmed with the need to create more content, faster, customized for more customers, and for more media than ever before?Do you consider storing documentation on a server as an effective a content management system? Do you want to learn how content management will empower your organization? The answer to these questions and many more is covered in Managing Enterprise Content: A Unified Content Strategy by Ann Rockley with Pamela Kostur and Steve Manning of The Rockley Group. The Rockley Group is one of the leading providers of content management methodologies. 5-0 out of 5 stars A must for Content Management projects
This book is an absolute must for Content Management projects. It touches all of the important aspects: Technical, functional and process. There is something for all stakeholders in a EMS/CMS project.2-0 out of 5 stars Misleading title...really unifed content creation
I was disappointed that the book was really focused on how to create reusable elements that go into product information such as data sheets, marketing collateral, technical support, etc.It focused on auditing the content, finding the reusability elements across departments, then designing an appropriate hierarchy on top of a content management system.It assumed that content drives the information architecture when in most applications it is the business processes that drive the architecture.It ignored the majority of enterprise content like email, word docs, design specs, forms, etc. that make up the real information content of the enterprise.Read more

Subjects:  1. Business Enterprise    2. Business enterprises    3. Business records    4. Computer Books: General    5. Computers    6. Computers - Communications / Networking    7. Data processing    8. Desktop Publishing    9. Electronic Commerce    10. Internet - Web Site Design    11. Internet - World Wide Web    12. Management    13. Management Information Systems    14. Networking - General    15. Computer Programming    16. Computers / Internet / General    17. Network security   


20. RFID: Applications, Security, and Privacy
by Addison-Wesley Professional
Hardcover (06 July, 2005)
list price: $54.99 -- our price: $45.64
(price subject to change: see help)
Isbn: 0321290968
Sales Rank: 146067
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Excellent Survey of RFID; present and future issues.
This is a compilation of papers from numerous organisations with diverse opinions on how this technology will develop.RFID presents opportunities for great improvement in business efficiencies for corporations and better service for customers and consumers.The flip side is that RFID has the potential to negatively impact individual privacy more than most technologies.
4-0 out of 5 stars speculative deployments
The chapters are written by different authors, concerning various aspects about RFID. The topics give an idea of the scope of RFID deployment. None of the chapters would be considered technical. You are not required to be an electrical engineer to follow any chapter.
3-0 out of 5 stars Fast track RFID project helper
For those who want faster diving in RFID technology I would recommend to take a look at DataBrokers TagTracker. Their new version works with LF and HF transponders and uses Hibernate to store scanned data in a database. It comes with PIRF-Lite (Java written API) which allows the user to make new transponder layouts and interact with the RFID reader differently than it is shown in TagTracker. TagTracker itself is enough to collect RFID data from different locations (RFID readers) and store it in a common database. Like a data pump. All you need is to create your own interface to query the database using your preferred languages/tools , etc. ... Read more

Subjects:  1. Applied Electromagnetics    2. Automation    3. Business & Economics    4. Business/Economics    5. Computer Books: General    6. Computers - Communications / Networking    7. Data Transmission Systems - General    8. Inventory Control    9. Management - General    10. Microwaves    11. Privacy, Right of    12. Radio frequency identification    13. Radio frequency identification systems    14. Security - General    15. United States    16. Computers / Data Transmission Systems / General    17. Radio technology   


1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top