BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Digital Business & Culture - Project Management - Security

1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$50.39
1. CISSP All-in-One Exam Guide, Third
$32.99
2. File System Forensic Analysis
$19.77
3. Mac OS X Tiger: Missing Manual
$60.00
4. Cisco ASA and PIX Firewall Handbook,
$7.99
5. Digital Fortress
$67.15
6. Official (ISC)2 Guide to the CISSP
$57.00
7. Security Engineering: A Guide
$48.00
8. Applied Cryptography: Protocols,
$59.85
9. Advanced modelling in finance
$96.00
10. Financial Instrument Pricing Using
$16.47
11. Mind Hacks: Tips & Tools for
$16.29
12. How to Be Invisible: The Essential
$32.99
13. Gray Hat Hacking : The Ethical
$29.69
14. Rootkits: Subverting the Windows
$37.34
15. IPv6 Essentials
$110.00
16. Transaction Processing: Concepts
$25.17
17. Silence on the Wire: A Field Guide
$29.67
18. Programming .NET Components, 2nd
$73.10
19. Management of Information Security
$32.99
20. Hacking Exposed 5th Edition (Hacking

1. CISSP All-in-One Exam Guide, Third Edition (All-in-One)
by McGraw-Hill Osborne Media
Hardcover (15 September, 2005)
list price: $79.99 -- our price: $50.39
(price subject to change: see help)
Isbn: 0072257121
Sales Rank: 1968
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (127)

5-0 out of 5 stars By far the BEST book for CISSP certification
I have been teaching the CISSP certification for IT Mentor for the last 5 years.This is the book I use for all of my students.I must say, this is the best book you can buy.I have over 20 CISSP books in my library, but I always recommend this one.
3-0 out of 5 stars Good book, though some turn offs
The book has a good coverage on most of the topics. I think if you already have Telecom and Crypto background, you'll be fine with this book, as those don't seem to be done well enough though they are important fot the exam.
4-0 out of 5 stars How to study and pass the CISSP.
Three weeks after I took the CISSP exam, I received an email telling me I had passed. I came out of the exam fairly confident I'd pass but one can never be too sure with the CISSP - the questions are quite ambiguous and quite often you are making an educated guess in picking out what you think is the best among the 2 choices you have narrowed down to. It has often been said that the CISSP is an exam that is an inch deep and a mile wide. You'd be lucky if you use more than half of what you studied for this exam. I am a software engineer and I know I will never have to choose which fire extinguisher to use for which kind of fire, unless I am actually struck in one!
Read more

Subjects:  1. Certification Guides - General    2. Computers & Technology    3. Computers - Certification    4. Education    5. Security    6. Security - General    7. Computers / Technical Skills    8. Systems management   


2. File System Forensic Analysis
by Addison-Wesley Professional
Paperback (17 March, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0321268172
Sales Rank: 14172
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (19)

5-0 out of 5 stars Accept no substitutes -- THE book to read on file systems
I decided to read and review three digital forensics books in order to gauge their strengths and weaknesses: "File System Forensic Analysis" (FSFA) by Brian Carrier, "Windows Forensics" (WF) by Chad Steel, and "EnCase Computer Forensics" (ECF) by Steve Bunting and William Wei.All three books contain the word "forensics" in the title, but they are very different.If you want authoritative and deeply technical guidance on understanding file systems, read FSFA.If you want to focus on understanding Windows from an investigator's standpoint, read WA.If you want to know more about EnCase (and are willing to tolerate or ignore information about forensics itself), read ECF.
5-0 out of 5 stars The best work on the topic
Carrier's book has prooven invaluable to this digital forensics trainee, and I expect many of the old hands in the field will be keeping it on hand as well.If you're serious about computer forensics, you need a copy.

4-0 out of 5 stars Very deep
I'm pretty technical, so I enjoyed this book.The author has more on file systems than just about anywhere, and I found it helpful in non security work also just to understand how the different systems work.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Data Security    4. Computer security    5. Computers    6. Data structures (Computer science)    7. File organization (Computer science)    8. Internet - Security    9. Security - General    10. Computers / Internet / Security    11. Computing and Information Technology   


3. Mac OS X Tiger: Missing Manual
by O'Reilly Media
Paperback (01 August, 2005)
list price: $29.95 -- our price: $19.77
(price subject to change: see help)
Isbn: 0596009410
Sales Rank: 511
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (69)

5-0 out of 5 stars good for beginners
It is a very good guide book for beginners really. I knew maybe just a little about Mac. But definitely not enough to help me go though a smooth work process. This book teaches me shortcuts and the necessary surviving skills I needed. I would recommend to other people.

5-0 out of 5 stars Pretty Good Tutorial
Having switched from a PC a year ago and having suffered through 12 months with no manual, it is a relief to have it. It is written in plain English, very basic intro to Tiger OS X and should absolutely have been provided to customers free with the computer. Apple is too cute in assuming everyone, of course, is intuitive about "getting" its system. If you've spent much time in PC land it is a huge transition. This book is great because it assumes no knowledge and provides basic definitions. I also bought another "Missing Manual" for iPhoto and that was helpful, as well.

5-0 out of 5 stars A must-have resource for Mac users
When the Help Menu can't, and you're stuck for an answer, Pogue's Missing Manual is always there with an answer. ... Read more

Subjects:  1. Computer - Apple/Macintosh    2. Computer Books: General    3. Computer Books: Operating Systems    4. Computers    5. Hardware - Personal Computers - Macintosh    6. Macintosh (Computer)    7. Operating Systems - General    8. Operating systems (Computers)    9. Programming    10. Computer / Apple/Macintosh    11. Computers / Personal Computers & Microcomputers / Macintosh    12. Mac OS X, Tiger, Mac OS, Apple, Finder, System Preferences, Spotlight, Dashboard, iChat, QuickTime, Aqua, Mac OS X, Mac OS, Macintosh, Mac, 10.4, Apple, Finder, Dock, System Preferences, Java, AppleScript, System Administration, Network Administration, BSD, Unix, FreeBSD, Terminal, Perl, Darwin, Apache, MySQL, vi, vim, Emacs, CVS, tcsh, bash, Bourne shell, VPN, SSH, Secure Shell, Directory Services, Open Directory, NetInfo, osascript, OSA, AFP, Rendezvous, SMB, Samba, Developer Tools, Xcode, Interface Builder, Fink, Darwin Ports    13. Macintosh OS   


4. Cisco ASA and PIX Firewall Handbook, First Edition
by Cisco Press
Paperback (07 June, 2005)
list price: $60.00 -- our price: $60.00
(price subject to change: see help)
Isbn: 1587051583
Sales Rank: 17696
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (14)

5-0 out of 5 stars Complement to other sources available
I think author did a wonderful job filling in where other popular litrature about PIX left off.I read the CCSP book, and leared alot.This book filled in stuff that CCSP book just does not talk about.Not to knock the CCSP book; each auther can only fill in so much.It is a difficult decision on what to keep and what to leave off.I find the PIX and ASA book is very practical.If you want a good understanding of this platform, then you want this book as the pliers in your tool box of knowledge.Do not expect it to be swiss army tool though.I think author was especially considerate to the reader's needs to publish items that other litrature just does not cover.There is alot of good information.Nice pictures which addressed questions I had and even posted to some CCIE sites and there was no answer.Definately worth buying.

3-0 out of 5 stars Very little on ASA
This book is very helpful for PIX firewalls, but is mislabeled for ASA. There is very little on the ASA product. Usually just a mention of command differences between ASA and PIX. If you are looking for a book on ASA do not buy this book.

5-0 out of 5 stars One point makes this book a must have
Most commands explained have three lines:
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Internet - Security    7. Security    8. Security - General    9. Computers / Internet / Security    10. Network security   


5. Digital Fortress
by St. Martin's Press
Mass Market Paperback (30 December, 2003)
list price: $7.99 -- our price: $7.99
(price subject to change: see help)
Isbn: 0312995423
Average Customer Review: 3.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

In most thrillers, "hardware" consists of big guns, airplanes, military vehicles, and weapons that make things explode. Dan Brown has written a thriller for those of us who like our hardware with disc drives and who rate our heroes by big brainpower rather than big firepower. It's an Internet user's spy novel where the good guys and bad guys struggle over secrets somewhat more intellectual than just where the secret formula is hidden--they have to gain understanding of what the secret formula actually is.Read more

Reviews (824)

3-0 out of 5 stars Enjoyable but flawed techo-thriller
The National Security Agency's new and mighty code-cracking computer, TRANSLTR, has been working on a single puzzle for so long that the top cryptographer at "No Such Agency" (as it's nicknamed) can't believe her eyes when she sees its time elapsed counter. Her boss, Deputy Director Strathmore, has called her in on a Saturday because he trusts his protege to help him obtain the algorithm's pass-key without letting anyone else know what's going on. This algorithm, called Digital Fortress, is billed by its creator - a disgruntled and idealistic former NSA employee - as the only uncrackable encryption code ever written. Strathmore has fed it into TRANSLTR to test that claim. He must have the pass-key to carry out his plan for Digital Fortress, assuming it really can't be broken.
3-0 out of 5 stars Abridged CD was interesting, but...
Digital Fortress, the CD, was narrated by Bruce Sabath.Since I haven't read the unabridged version (and haven't read any other reviews of the abridged version), I can't comment whether the editors make a so-so story better or worse by cutting it down.In the abridged version, perhaps the unbelievable occurrences were tempered by the interest I had in the workings (real or imagined) of the ultra-secret NSA and the code-breakers.
2-0 out of 5 stars a little too far fetched
Maybe it's just the geek in me crying out for mercy, but I find a lot of the details of this book pretty far-fetched.Plus, after we figured out whodunit and such, it just seemed to drag on forever.I ended up skimming the last 30 pages or so just to get it over with.
Read more

Subjects:  1. Computer security    2. Cryptographers    3. Espionage/Intrigue    4. Fiction    5. Fiction - General    6. General    7. Intelligence officers    8. Technological    9. Thrillers    10. Science fiction   


6. Official (ISC)2 Guide to the CISSP Exam
by AUERBACH
Hardcover (15 December, 2003)
list price: $69.95 -- our price: $67.15
(price subject to change: see help)
Isbn: 084931707X
Sales Rank: 8490
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (46)

2-0 out of 5 stars On topic, but needs much better editing
I read and studied this book," Official (ISC)2 Guide to the CISSP Exam", for my one study aid in quick preparation for the CISSP exam. I found the book's coverage of topics and the common body of knowledge to be fine; indeed the book is tuned to the CISSP exam's intended scope rather well. The problem with this book is quality control and the details. Just to get it out of the way, what annoyed me the most is that many of the sample "exam questions" are flawed lacking quality control. Not flawed like the CISSP exam questions themselves are known to be, but simply poorly written. The answer section for the sample questions has many flaws and mistakes: such as mixing up answers for other chapters' questions, unfinished text, etc. A frustrating way to end each chapter.
5-0 out of 5 stars Cosider a must-have
I rate this book very hight because it is a serious content / concept based book for not only the exam but to really make things clear that it covers.
4-0 out of 5 stars Good book, but not end-all be-all
A very useful resource for anybody interested in the field of Information Security. It provides an overview of the 10 bodies of knowledge that candidates for the CISSP exam are required to master. However, while this book is excellent as reference material, it is not as suitable as a study guide. Due to the nature of the book (it is authorized by many different writers), there is quite a bit of repetition of material, and slightly different viewpoints on what often appears to be the same issue. Sometimes, the differences between the viewpoints are not clearly articulated, which may lead to confusion.
Read more

Subjects:  1. Certification Guides - General    2. Computer Books: General    3. Computers    4. Computers - Certification    5. General    6. Networking - General    7. Security    8. Security - General    9. Computers / Security    10. Network security   


7. Security Engineering: A Guide to Building Dependable Distributed Systems
by Wiley
Paperback (22 January, 2001)
list price: $75.00 -- our price: $57.00
(price subject to change: see help)
Isbn: 0471389226
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Gigantically comprehensive and carefully researched, Read more

Reviews (24)

5-0 out of 5 stars Available for free
Before purchasing this book, you might like to browse through its contents.It is available in its entirety for free on the author's website.Here's the URL:
3-0 out of 5 stars More high-level concepts and less hands-on guidance
This is certainly a good book for getting introduced to most high-level architectural concepts related to Network security, cryptography, mandatory/multi-level access control etc. From a application development perspective, this book falls short on how to build architecure, design and implement them into your business applications which ultimately meets the end-user. The author justifies the high-level concepts well enough from a generalist perspective, but the industry-standards from OASIS leans towards standards-based application security protocols..which pushes a developer/architect like me to take those suggestions first and how to apply them in real world.The book also does'nt address on how-to build security for emerging application architectures based on Service-oriented architecture (SOA), Identity Management, Net-centric Federated applications. As a developer/architect using Java or Microsoft .NET or open-source based distributed applications, I need guidance on how to implement the recommended concepts (in the book) for example using biometrics or smartcards for building multi-factor access control at my application-level...unfortunately I don't find any answers for real-world implementation.

5-0 out of 5 stars Best security book on the market
This book is a must own and a must read.Ross Anderson may tweak people's noses on occassion...but usually because they need tweaking.Get this book now.Really. ... Read more

Subjects:  1. Computer Books And Software    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Computer Security    6. Computers - General Information    7. Distributed Computer Systems    8. Distributed processing    9. Electronic data processing    10. Management Information Systems    11. Networking - General    12. Programming - Systems Analysis & Design    13. Security - General    14. Computers / Networking / General    15. Data security & data encryption    16. Network security   


8. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
by Wiley
Paperback (18 October, 1995)
list price: $60.00 -- our price: $48.00
(price subject to change: see help)
Isbn: 0471117099
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Read more

Reviews (96)

5-0 out of 5 stars A must-have book for understanding Cryptography.
This book has really shed a lot of light on cryptography for me. I honestly can't put it down--I wish I had paid more attention in my statistics classes so I could be able to apply some of the stuff the author talks about better. I am about half way through the book, and I haven't gotten to the point where it's more of a chore than a pleasure to read it (something I can't about my other technical books).
5-0 out of 5 stars Prepare to drink from the firehose
This book is really incredible.When it was first published in the mid-90's, there was almost no material available on the subject of cryptography.Now, ten years later, there are dozens, if not hundreds, of books riding on Schneier's coattails - but almost none have anything new or useful to say.Impeccably researched (with 1,653 references!) and unarguably complete, Schneier's expertise in theoretical mathematics, experience as a practitioner, and razor-sharp lucidity combine to make this the only book you'll ever need on the subject of cryptography.

5-0 out of 5 stars Text Book for School
The book was in excellent condition.The book came within the alloted time period.No complaints! ... Read more

Subjects:  1. Computer Books: General    2. Computer security    3. Computers - Computer Security    4. Computers - Languages / Programming    5. Cryptography    6. Discrete Mathematics    7. Programming Languages - General    8. Security - General    9. Security measures    10. Telecommunication    11. Computers / Security    12. Data security & data encryption   


9. Advanced modelling in finance using Excel and VBA
by John Wiley & Sons
Hardcover (30 May, 2001)
list price: $95.00 -- our price: $59.85
(price subject to change: see help)
Isbn: 0471499226
Sales Rank: 10822
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (11)

5-0 out of 5 stars Absolutely Great!
Advanced Modeling is a fantastic book, and pretty easy to follow with relatively few coding errors.There are some books out there that have errors in the code that they use, which makes it difficult or someone to learn the techniques.Even for those without a solid background in VBA, this book can benefit you to start learning how to code properly.Anyone who is relatively proficient with Excel can definitely gain a new trick or two from reading this book.All you really need to start using this book is a basic understanding of finance concepts (e.g. portolio theory, capital budgeting, binomial options pricing, Black-Scholes, etc.).The techniques that are taught are also useful in other modeling exercises, and not necessarily just for finance-related topics.

5-0 out of 5 stars A Cookbook for Financial Modellers
Yes, the book won't teach you CAPM, Black-Scholes, or much financial theory.But there is NO shortage of those books.There is a shortage of books with real-world Excel solutions to applying financial theory to data.I've had this book for a couple of years and have probably only used 10% of it, only because I don't have time, real business need, to do the rest.I sometimes take it to bed to read and dream of having the time to try out some of their other models.That's the only thing I can add to the other reviews here, the amount of love and passion for the subject put into this book.There's not one extra padded word or graphic in this book.Yes, if there was one book I'd have to take to a desert island with Excel and some financial data this would be it.

3-0 out of 5 stars Not really satisfying
One of the main points of programming books is to help the reader understand the models being programmed.On this count, "Advanced modelling in finance using Excel and VBA" fails miserably.There is very little explanation of the financial concepts and models.Anyone hoping to learn finance from this book will be very disappointed.Read more

Subjects:  1. Accounting - General    2. Applied    3. Business & Economics    4. Business / Economics / Finance    5. Business/Economics    6. Economics - General    7. Finance    8. Financial Economics (General)    9. General    10. Mathematical Models In Economics    11. Mathematical models    12. Microsoft Excel (Computer file    13. Microsoft Excel (Computer file)    14. Microsoft Visual Basic for app    15. Microsoft Visual Basic for applications    16. Business & Economics / Finance    17. Excel    18. Investment & securities   


10. Financial Instrument Pricing Using C++ (The Wiley Finance Series)
by John Wiley & Sons
Hardcover (27 August, 2004)
list price: $120.00 -- our price: $96.00
(price subject to change: see help)
Isbn: 0470855096
Sales Rank: 43246
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

5-0 out of 5 stars very good book.
implementation and design of classes wise this book is replete with ideas. Since this book dealt with FDM, which are either cubbersome or difficult to program say american options, better is to deal with FE methods.

5-0 out of 5 stars Computational Finance made efficient
This book encapsulates all that is wonderful about OOP and shows how generic programming techniques (based on the STL) can be effectively applied to financial engineering and numerical analytic problems. The book requires only a first-course level knowledge of C++ (at the level of for example Ivor Horton's Beginning C++) and a first course level knowledge of Financial Mathematics (at the level of for example John Hull's masterpiece) and takes the reader on an entertaining journey through the basics of the STL and the applications of STL constructs to computational-financial and numerical-analytic problems, especially those relating to the numerical solution of partial differential equations. Also, the author makes a persuasive case for finite-difference methods and deals with a few subtleties of the Crank-Nicholson algorithm. For best results, it should be read along with a decent book on the Standard Library (for example the one by Nicolai Josuttis). Overall, it's a pleasure to read and learn from, on a par with Mark Joshi's little design-patterns volume, and more detailed!

5-0 out of 5 stars The best book in c++ instrument pricing, period.
Let me just say that I have a few financial modelling books, from Dr. Brooks to Mr. Joshi, and this is the best book by far.It clearly explain how to price a particular instruments using this poweful language.The book uses Standard Template Language (STL), by doing so your code are more readable and much faster.If I only had this book a few years back.Now I must say this book is for C++ programmers and Quants you really need to know C++ from beginning to end, templates, pointers, references, classes or that stuff you need it. This is the only book that comes with working code, it doesn't matter what type of compiler you have the code in the CD will work.Mr. Duffy explains how to model one factor and two factor Black-Scholes equations using finite differences, options(vanilla, exotic),interest rate and much more.The CD even comes with an Excel driver to transfer your data to Excel. Quant superstar Justin London is coming with his new book in a few months, and that book might over take this one, but as of right now this is the best C++ financial pricing book around.You can't go wrong with this one. ... Read more

Subjects:  1. Business & Economics    2. Business / Economics / Finance    3. Business/Economics    4. C++ (Computer program language    5. C++ (Computer program language)    6. Finance    7. Financial engineering    8. Investments    9. Investments & Securities - General    10. Mathematical models    11. Securities    12. Business & Economics / Finance    13. Computer Software Packages    14. Investment & securities    15. Software engineering   


11. Mind Hacks: Tips & Tools for Using Your Brain (Hacks)
by O'Reilly Media
Paperback (22 November, 2004)
list price: $24.95 -- our price: $16.47
(price subject to change: see help)
Isbn: 0596007795
Sales Rank: 12783
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (18)

4-0 out of 5 stars Mind Hacks: Tips & Tools for Using Your Brain
It's a book very interested about language in mind and speech comprehension. I read a short comment in BBC Focus magazine and I wish to read because it's very easy to learn the misteries of mind in cognitive science applied to language and psichology.

4-0 out of 5 stars A fun book
It is not a typical "hacks" book in that it does not tell you how to utilize you brain more effectively or do neat things.It *does*have a lot of exercises that show you cool things on how your brain works with sections describing how your brain works - and a number of experiments (blind spot, Magnet interaction with the brain, word parsing in the the mind, and so on). This book goes very well with a recent title called _Mind Wide Open_ by Steven Johnson.
5-0 out of 5 stars Interesting reading
I found this book to be interesting in the way that it presents it's topics. It was insightful and worth the purchase. It is the type of book that you select chapters that interest you as opposed to going cover to cover. ... Read more

Subjects:  1. Brain    2. Cognitive Psychology    3. Computer Books: General    4. Computers    5. Neuropsychology    6. Popular works    7. Psychology    8. Security - General    9. Thought and thnking    10. Attention    11. Cognitive theory, metacognition, vision, audition, motor skills, brain research, cortex, metacortex, sensori-motor    12. Computers / Social Aspects / Human-Computer Interaction    13. Data security & data encryption    14. Listening    15. Movement, Psychology of    16. Network security    17. Psychology & Psychiatry / Neuropsychology    18. Psychology/Cognitive Psychology    19. Reasoning    20. Thought and thinking    21. Visual perception   


12. How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
by Thomas Dunne Books
Hardcover (March, 2004)
list price: $23.95 -- our price: $16.29
(price subject to change: see help)
Isbn: 0312319061
Sales Rank: 5121
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (32)

3-0 out of 5 stars Outdated. Some examples are not practical
Somewhat outdated.
5-0 out of 5 stars Solid advice from a true believer
I carefully read the first edition of the book approximately 7 years ago.Though I didn't perceive at the time that I had a need for "invisibility", I adopted several of the recommendations in the book simply because they made me feel more comfortable.I was subsequently harrassed by a disgruntled former employee.At least one overt act of his was thwarted by my privacy measures.How many others, I'll never know.Every bit of energy and money I'd invested in my privacy was paid back and then some.
5-0 out of 5 stars Excellent book on Privacy Techniques!
This is an excellent book on privacy techniques.What I like about it is that JJ Luna discusses various levels of privacy, and I have found that the more privacy you want, the more time/effort you will have to go through to maintain it.He talks about how to go about receiving your mail, where to choose to live, how use the phone, how to pay people, and how to title assets more privately.I like this book because JJ Luna does not try to force a one size fits all agenda upon people, but lets the reader decide on what level of privacy is right for them. There are varying levels of privacy which can be obtained for each one, depending on your circumstances (e.g. family, job, etc).Of course, the more privacy you want, the more you will have to sacrifice, but most of these techniques are simple and won't take too much extra time out of your week.
Read more

Subjects:  1. Business & Economics    2. Computer security    3. Identification    4. Personal Finance    5. Personal Finance - General    6. Political Freedom & Security - Civil Rights    7. Politics / Current Events    8. Privacy, Right of    9. Right of privacy    10. United States   


13. Gray Hat Hacking : The Ethical Hacker's Handbook
by McGraw-Hill Osborne Media
Paperback (09 November, 2004)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072257091
Sales Rank: 10381
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (12)

5-0 out of 5 stars i love GHH
i have read tonnes of books on this subject.starting from secrets of a super hacker by knightmare(published way back in 94, trust me dat was a great read n even 2day i find myself glued to da back as the first time i read it.now coming back 2 gray hat hacking.this is wat i would like 2 call the hacking reference book for the next generation.every one concerned about security should consider picking up this book.u might as well save some money n picking up more knowledge than any of the hacking exposed books in the market.no this book is not for button clicking script kiddies who play around wid trojans n claim to be hackers or web defacers(lamers).if u belong to da breed of script kiddies pick up this disgustin book by ankit fadia (oh by the way ive reviewed it).i wouuld liek to congradulate the authors for the outstanding work put into this book.howeever it would be great to see expanded materials on various topics and a little more detail in tool description.its not bad but it could still be better.so as i said before get dis book u wont regret it.so kiddies grow up keep those hacking exposed n ankit fadias books apart throw em in da firplace burn em do anythin .but go get dis one
4-0 out of 5 stars Covers more than the typical hacking book
"Gray Hat Hacking - The Ethical Hacker's Handbook" is not your normal hacking book.This book should not be lumped in with the "Hacking Exposed" series nor the likes of "Counter Hack".What differentiates Gray Hat Hacking (GHH) from other books is the amount of code the book offers.This book is not for script kiddies, but instead shows how to advance to the next level of hacking (and, more importantly, prevention) by devoting over 100 pages to developing programming skills for both Linux and Window exploits.I had not encountered a book that dedicated this much space to scripting.
5-0 out of 5 stars Great buy for every IT dept.
I bought this book from a store in D.C, and read it on my way back to India. I was impressed. Never found any book that deals with computer security and software vulnerabilities written so well. The reason I like this book is than others is because it does not only give you information that can help you in assessing your network security, but also gives you a basic introduction to the laws and legal technicalities. The contents of this book cover most of computer/network security related areas including technical implementation, planning, and defense. Therefore, it is not only for system engineers, but also for people managing IT departments.
Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Security - General    5. Computers / Security    6. Data security & data encryption    7. Network security   


14. Rootkits: Subverting the Windows Kernel
by Addison-Wesley Professional
Paperback (22 July, 2005)
list price: $44.99 -- our price: $29.69
(price subject to change: see help)
Isbn: 0321294319
Sales Rank: 5370
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (16)

5-0 out of 5 stars Welcome to the future
If you don't own this book, then the world will one day 0wn you.Buy this book today and learn from the masters about the ultimate tool in the attacker's toolkit.Greg Hoglund's work is essential to computer security.It behooves us all to understand it.
5-0 out of 5 stars Rootkit insights
One of the first books to go deeper in to rootkits of its kind.Not many books out there to give a understanding to IAT, SSDT, hooks, trampoline functions, and its relationship to rootkits.
3-0 out of 5 stars Not a book for Kernel Driver Developer
This book tells me what RootKit really means. One useful thing I got from this book was that in Windows Kernel even simple code can be used against security. And that's it. Most techniques in this book are primitive to kernel developers. I don't recommend this book to serious kernel driver developers. "Windows Internals" and OSR Online should be the way to go. ... Read more

Subjects:  1. Access control    2. Computer - Internet    3. Computer Books: Internet General    4. Computer Data Security    5. Computer security    6. Computers    7. Internet - Security    8. Microcomputer Operating Environments    9. Computers / Internet / Security    10. Data security & data encryption    11. Network security   


15. IPv6 Essentials
by O'Reilly Media
Paperback (17 May, 2006)
list price: $44.99 -- our price: $37.34
(price subject to change: see help)
Isbn: 0596100582
Sales Rank: 10842
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (12)

5-0 out of 5 stars VERY VERY HIGHLY RECOMMENDED!!
Are you interested in wanting to understand and implement the IPv6 protocol! If you are, then this book is for you. Author Silvia Hagen, has done an outstanding job of writing a book that covers IPv6 in detail and explains all of the new features and functions.
5-0 out of 5 stars Excellent discussion of IPv6 protocols
I read and reviewed "IPv6 Network Administration" (INA) in August 2005 and "Running IPv6" (RI) in January 2006.I gave those books 5 stars, so I had high expectations for "IPv6 Essentials, 2nd Ed" (IE2E).INA and RI are very hands-on, implementation-specific books.IE2E is more concerned with explaining protocols and IPv6 features.In this respect, IE2E is the perfect complement to INA and RI.
5-0 out of 5 stars Excellent 2nd edition contains lots of practical information
Internet Protocol version 6 (IPv6) is a network layer standard used by electronic devices to exchange data across a packet-switched internetwork and is intended to provide more addresses for networked devices, allowing, for example, each cell phone and mobile electronic device to have its own address. IPv6 is actually capable of supporting5×10^28 addresses for each of the roughly 6.5 billion people alive today.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Networks    4. Computers    5. Computers - Communications / Networking    6. Internet - General    7. Internet - Security    8. Networking - Network Protocols    9. Computer / Internet    10. Computers / Networking / Network Protocols    11. Computers/Internet - General    12. Networking standards & protocols    13. TCP/IP (Computer network protocol)    14. ipv6, network, internet, protocol   


16. Transaction Processing: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
by Morgan Kaufmann
Hardcover (1993)
list price: $110.00 -- our price: $110.00
(price subject to change: see help)
Isbn: 1558601902
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

This is the one book you ought to have if you want to expand your knowledge of online transaction processing (OLTP) and learn how to apply it to the real world. Read more

Reviews (8)

5-0 out of 5 stars This is the bible for Transaction Processing!
This book is the base for all who want to be a Gurus in a bigs systems OLTP with hundreds of TPS and hundreds or thousands of customes conected doing transactions or using a terminals. This is a book that you mast have mandatorily.

5-0 out of 5 stars This book is a revelation
God himself has spoken. You will understand what is the difference between real computer science (Jim Gray) and changing configuration values at random in your MySQL setup (Jeremy Zawodny style)

5-0 out of 5 stars Perfect
Well organized, complete, nontrivial, wealth of sample code, interesting historical notes, good index. Magnificent work. Definitely worth the money. ... Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Data Base Management    4. Data Processing - General    5. Database Management - General    6. Distributed Computer Systems    7. Information Storage & Retrieval    8. Transaction systems (Computer    9. Transaction systems (Computer systems)    10. Computers / Information Storage & Retrieval    11. General Theory of Computing    12. Investment & securities   


17. Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
by No Starch Press
Paperback (15 April, 2005)
list price: $39.95 -- our price: $25.17
(price subject to change: see help)
Isbn: 1593270461
Sales Rank: 29383
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (16)

4-0 out of 5 stars Interesting and detailed
Zalewski offers a nice overview of passive information extraction techniques. Each section covers one approach to the problem of determining something about someone's computer use without being detected. He provides an overview of the technology involved and then talks about how to exploit it.
3-0 out of 5 stars Interesting
This is one of those books that you go HMMMMMM!!! Very Interesting, but most of the things in the book are hard to understand. Also, he jumps around alot like if he's having a conversation rather than an inside manual to Attacks.

5-0 out of 5 stars Ages well
This is one of the few information security books that seem to age well: I reread it after over a year, and it still appears to be quite refreshing and up to date. This only goes to show the difference between books written out of genuine passion, and the rest. Big kudos to the author. ... Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computers    4. Computers - Computer Security    5. Security - General    6. Security measures    7. Computers / Computer Security    8. Computers / Security    9. Data security & data encryption    10. Network security    11. security, privacy, network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, forensics   


18. Programming .NET Components, 2nd Edition
by O'Reilly Media
Paperback (01 July, 2005)
list price: $44.95 -- our price: $29.67
(price subject to change: see help)
Isbn: 0596102070
Sales Rank: 3080
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (54)

5-0 out of 5 stars Simply Awesome
This is the my first review on Amazon. This book is so nicely written. The examples are short and precise. All the Advanced topics are covered in a great way. Highly recommend it to all developers who want to gain more expertise.

5-0 out of 5 stars The best .net book I have read so far
this book brought me out of the darkness into the light.
5-0 out of 5 stars Great coverage of complex material
L�wy's book does a great job covering some complex, arcane topics.He nicely lays out fundamentals on interface-based design and development, then moves on to clearly cover tough topics like remoting and multithreading.
Read more

Subjects:  1. Computer Books: Operating Systems    2. Computers    3. Computers - Operating Systems    4. Microcomputer Application Software    5. Operating Systems - Windows    6. Programming - General    7. Programming - Software Development    8. Programming Languages - C#    9. Computer Programming    10. Computers / Operating Systems    11. Computers / Operating Systems / Windows    12. Computers/Programming - Software Development    13. Computers/Programming Languages - C#    14. Computers/Programming Languages - Visual BASIC    15. com, com+, component, .net, .net component, component services, regional director, software legend, component oriented, component-oriented programming, dll, assemblies, binary component, object-oriented, interface based, encapsulation, polymorphism, reuse, dll hell, security, attributes   


19. Management of Information Security
by Course Technology
Paperback (January, 2004)
list price: $76.95 -- our price: $73.10
(price subject to change: see help)
Isbn: 0619215151
Sales Rank: 106857
Average Customer Review: 3.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (2)

2-0 out of 5 stars Boring, boring, boring
Did I tell you the book was boring?
4-0 out of 5 stars Philosophical (Textbook) exposition of InfoSec
If you're looking to get down into the nitty-gritty of infosec, for ways and methods of securing networks and systems, then this probably isn't the book you need. This is a textbook and so it overs a fairly high level viewpoint, even philosophical approach, to infosec. The granualarity just isn't there for the practising person to gain much from this in a substantive way.
Read more

Subjects:  1. Business / Economics / Finance    2. Computer Books: General    3. Computers    4. Information Management    5. Information Technology    6. Leadership    7. Management Information Systems    8. Security - General    9. Business information systems    10. Data security & data encryption    11. Management & management techniques   


20. Hacking Exposed 5th Edition (Hacking Exposed)
by McGraw-Hill Osborne Media
Paperback (19 April, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072260815
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

A lot of computer-security textbooks approach the subject from adefensive point of view. "Do this, and probably you'll survive a particular kindof attack," they say. In refreshing contrast, Read more

Reviews (82)

5-0 out of 5 stars Information Security
I had to purchase this book for college but it is a great read. One of the only textbooks that I have used that was actually interesting. They give clear examples and make it easy to follow thier explanations. Great book if you want to learn about hacking and some of the issues it involves.

3-0 out of 5 stars Still solid but redundant and a bit tired
I cannot say anything more that other positive reviews have not already said.
3-0 out of 5 stars Good, but aging
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Computer Security    7. Data protection    8. Internet - Security    9. Networking - General    10. Security - General    11. Security measures    12. Computer Communications & Networking    13. Computer fraud & hacking    14. Computers / Security    15. Data security & data encryption   


1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top