BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Web Development - Security & Encryption

1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20

  • Cryptography
  • Encryption
  • Network Security
  • Security
  • Viruses
  • click price to see details     click image to enlarge     click link to go to the store

    $50.39
    1. CISSP All-in-One Exam Guide, Third
    $32.99
    2. File System Forensic Analysis
    $19.77
    3. Mac OS X Tiger: Missing Manual
    $60.00
    4. Cisco ASA and PIX Firewall Handbook,
    $55.00
    5. Tools and Tactics for the Master
    $67.15
    6. Official (ISC)2 Guide to the CISSP
    $7.99
    7. Digital Fortress
    $57.00
    8. Security Engineering: A Guide
    $48.00
    9. Applied Cryptography: Protocols,
    $96.00
    10. Financial Instrument Pricing Using
    $59.85
    11. Advanced modelling in finance
    $16.47
    12. Mind Hacks: Tips & Tools for
    $29.69
    13. Rootkits: Subverting the Windows
    $32.99
    14. Gray Hat Hacking : The Ethical
    $37.34
    15. IPv6 Essentials
    $32.99
    16. SUSE LINUX Enterprise Server 9
    $25.17
    17. Silence on the Wire: A Field Guide
    $55.73
    18. Cisco ASA: All-in-One Firewall,
    $110.00
    19. Transaction Processing: Concepts
    $71.96
    20. Handbook of Applied Cryptography

    1. CISSP All-in-One Exam Guide, Third Edition (All-in-One)
    by McGraw-Hill Osborne Media
    Hardcover (15 September, 2005)
    list price: $79.99 -- our price: $50.39
    (price subject to change: see help)
    Isbn: 0072257121
    Sales Rank: 1968
    Average Customer Review: 4.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (127)

    5-0 out of 5 stars By far the BEST book for CISSP certification
    I have been teaching the CISSP certification for IT Mentor for the last 5 years.This is the book I use for all of my students.I must say, this is the best book you can buy.I have over 20 CISSP books in my library, but I always recommend this one.
    3-0 out of 5 stars Good book, though some turn offs
    The book has a good coverage on most of the topics. I think if you already have Telecom and Crypto background, you'll be fine with this book, as those don't seem to be done well enough though they are important fot the exam.
    4-0 out of 5 stars How to study and pass the CISSP.
    Three weeks after I took the CISSP exam, I received an email telling me I had passed. I came out of the exam fairly confident I'd pass but one can never be too sure with the CISSP - the questions are quite ambiguous and quite often you are making an educated guess in picking out what you think is the best among the 2 choices you have narrowed down to. It has often been said that the CISSP is an exam that is an inch deep and a mile wide. You'd be lucky if you use more than half of what you studied for this exam. I am a software engineer and I know I will never have to choose which fire extinguisher to use for which kind of fire, unless I am actually struck in one!
    Read more

    Subjects:  1. Certification Guides - General    2. Computers & Technology    3. Computers - Certification    4. Education    5. Security    6. Security - General    7. Computers / Technical Skills    8. Systems management   


    2. File System Forensic Analysis
    by Addison-Wesley Professional
    Paperback (17 March, 2005)
    list price: $49.99 -- our price: $32.99
    (price subject to change: see help)
    Isbn: 0321268172
    Sales Rank: 14172
    Average Customer Review: 5.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (19)

    5-0 out of 5 stars Accept no substitutes -- THE book to read on file systems
    I decided to read and review three digital forensics books in order to gauge their strengths and weaknesses: "File System Forensic Analysis" (FSFA) by Brian Carrier, "Windows Forensics" (WF) by Chad Steel, and "EnCase Computer Forensics" (ECF) by Steve Bunting and William Wei.All three books contain the word "forensics" in the title, but they are very different.If you want authoritative and deeply technical guidance on understanding file systems, read FSFA.If you want to focus on understanding Windows from an investigator's standpoint, read WA.If you want to know more about EnCase (and are willing to tolerate or ignore information about forensics itself), read ECF.
    5-0 out of 5 stars The best work on the topic
    Carrier's book has prooven invaluable to this digital forensics trainee, and I expect many of the old hands in the field will be keeping it on hand as well.If you're serious about computer forensics, you need a copy.

    4-0 out of 5 stars Very deep
    I'm pretty technical, so I enjoyed this book.The author has more on file systems than just about anywhere, and I found it helpful in non security work also just to understand how the different systems work.
    Read more

    Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Data Security    4. Computer security    5. Computers    6. Data structures (Computer science)    7. File organization (Computer science)    8. Internet - Security    9. Security - General    10. Computers / Internet / Security    11. Computing and Information Technology   


    3. Mac OS X Tiger: Missing Manual
    by O'Reilly Media
    Paperback (01 August, 2005)
    list price: $29.95 -- our price: $19.77
    (price subject to change: see help)
    Isbn: 0596009410
    Sales Rank: 511
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Features

    • Illustrated

    Reviews (69)

    5-0 out of 5 stars good for beginners
    It is a very good guide book for beginners really. I knew maybe just a little about Mac. But definitely not enough to help me go though a smooth work process. This book teaches me shortcuts and the necessary surviving skills I needed. I would recommend to other people.

    5-0 out of 5 stars Pretty Good Tutorial
    Having switched from a PC a year ago and having suffered through 12 months with no manual, it is a relief to have it. It is written in plain English, very basic intro to Tiger OS X and should absolutely have been provided to customers free with the computer. Apple is too cute in assuming everyone, of course, is intuitive about "getting" its system. If you've spent much time in PC land it is a huge transition. This book is great because it assumes no knowledge and provides basic definitions. I also bought another "Missing Manual" for iPhoto and that was helpful, as well.

    5-0 out of 5 stars A must-have resource for Mac users
    When the Help Menu can't, and you're stuck for an answer, Pogue's Missing Manual is always there with an answer. ... Read more

    Subjects:  1. Computer - Apple/Macintosh    2. Computer Books: General    3. Computer Books: Operating Systems    4. Computers    5. Hardware - Personal Computers - Macintosh    6. Macintosh (Computer)    7. Operating Systems - General    8. Operating systems (Computers)    9. Programming    10. Computer / Apple/Macintosh    11. Computers / Personal Computers & Microcomputers / Macintosh    12. Mac OS X, Tiger, Mac OS, Apple, Finder, System Preferences, Spotlight, Dashboard, iChat, QuickTime, Aqua, Mac OS X, Mac OS, Macintosh, Mac, 10.4, Apple, Finder, Dock, System Preferences, Java, AppleScript, System Administration, Network Administration, BSD, Unix, FreeBSD, Terminal, Perl, Darwin, Apache, MySQL, vi, vim, Emacs, CVS, tcsh, bash, Bourne shell, VPN, SSH, Secure Shell, Directory Services, Open Directory, NetInfo, osascript, OSA, AFP, Rendezvous, SMB, Samba, Developer Tools, Xcode, Interface Builder, Fink, Darwin Ports    13. Macintosh OS   


    4. Cisco ASA and PIX Firewall Handbook, First Edition
    by Cisco Press
    Paperback (07 June, 2005)
    list price: $60.00 -- our price: $60.00
    (price subject to change: see help)
    Isbn: 1587051583
    Sales Rank: 17696
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (14)

    5-0 out of 5 stars Complement to other sources available
    I think author did a wonderful job filling in where other popular litrature about PIX left off.I read the CCSP book, and leared alot.This book filled in stuff that CCSP book just does not talk about.Not to knock the CCSP book; each auther can only fill in so much.It is a difficult decision on what to keep and what to leave off.I find the PIX and ASA book is very practical.If you want a good understanding of this platform, then you want this book as the pliers in your tool box of knowledge.Do not expect it to be swiss army tool though.I think author was especially considerate to the reader's needs to publish items that other litrature just does not cover.There is alot of good information.Nice pictures which addressed questions I had and even posted to some CCIE sites and there was no answer.Definately worth buying.

    3-0 out of 5 stars Very little on ASA
    This book is very helpful for PIX firewalls, but is mislabeled for ASA. There is very little on the ASA product. Usually just a mention of command differences between ASA and PIX. If you are looking for a book on ASA do not buy this book.

    5-0 out of 5 stars One point makes this book a must have
    Most commands explained have three lines:
    Read more

    Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Internet - Security    7. Security    8. Security - General    9. Computers / Internet / Security    10. Network security   


    5. Tools and Tactics for the Master DayTrader: Battle-Tested Techniques for Day,Swing, and Position Traders
    by McGraw-Hill
    Hardcover (29 June, 2000)
    list price: $55.00 -- our price: $55.00
    (price subject to change: see help)
    Isbn: 0071360530
    Sales Rank: 35469
    Average Customer Review: 3.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (114)

    1-0 out of 5 stars Avoid this book at all costs
    Fortunately I only paid a few pound for this book at a book fair. I have been successfully day trading for over 5 years, have read in excess of 60 books. This is the worst I have seen. Oliver Velez should be taking out the backyard and horse whipped.

    5-0 out of 5 stars Beware of superbookdeals seller
    If you want to buy the book, go ahead, just be careful of superbookdeals, they take your money but don't deliver and don't answer emails. Caveat Emptor.

    5-0 out of 5 stars Love this book!!!!!!!
    This Book TOTALLY rocked!!!!! I read this book alot because it was so awesome ... Read more

    Subjects:  1. Accounting - General    2. Business & Economics    3. Business/Economics    4. Consumer Finance    5. Day trading (Securities)    6. Electronic trading of securiti    7. Electronic trading of securities    8. Futures And Options Trading    9. Handbooks, manuals, etc    10. Investments & Securities - General    11. Personal Finance - Investing    12. Business & Economics / Investments & Securities    13. Financial services industry    14. Internet    15. Investment & securities   


    6. Official (ISC)2 Guide to the CISSP Exam
    by AUERBACH
    Hardcover (15 December, 2003)
    list price: $69.95 -- our price: $67.15
    (price subject to change: see help)
    Isbn: 084931707X
    Sales Rank: 8490
    Average Customer Review: 4.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (46)

    2-0 out of 5 stars On topic, but needs much better editing
    I read and studied this book," Official (ISC)2 Guide to the CISSP Exam", for my one study aid in quick preparation for the CISSP exam. I found the book's coverage of topics and the common body of knowledge to be fine; indeed the book is tuned to the CISSP exam's intended scope rather well. The problem with this book is quality control and the details. Just to get it out of the way, what annoyed me the most is that many of the sample "exam questions" are flawed lacking quality control. Not flawed like the CISSP exam questions themselves are known to be, but simply poorly written. The answer section for the sample questions has many flaws and mistakes: such as mixing up answers for other chapters' questions, unfinished text, etc. A frustrating way to end each chapter.
    5-0 out of 5 stars Cosider a must-have
    I rate this book very hight because it is a serious content / concept based book for not only the exam but to really make things clear that it covers.
    4-0 out of 5 stars Good book, but not end-all be-all
    A very useful resource for anybody interested in the field of Information Security. It provides an overview of the 10 bodies of knowledge that candidates for the CISSP exam are required to master. However, while this book is excellent as reference material, it is not as suitable as a study guide. Due to the nature of the book (it is authorized by many different writers), there is quite a bit of repetition of material, and slightly different viewpoints on what often appears to be the same issue. Sometimes, the differences between the viewpoints are not clearly articulated, which may lead to confusion.
    Read more

    Subjects:  1. Certification Guides - General    2. Computer Books: General    3. Computers    4. Computers - Certification    5. General    6. Networking - General    7. Security    8. Security - General    9. Computers / Security    10. Network security   


    7. Digital Fortress
    by St. Martin's Press
    Mass Market Paperback (30 December, 2003)
    list price: $7.99 -- our price: $7.99
    (price subject to change: see help)
    Isbn: 0312995423
    Average Customer Review: 3.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Editorial Review

    In most thrillers, "hardware" consists of big guns, airplanes, military vehicles, and weapons that make things explode. Dan Brown has written a thriller for those of us who like our hardware with disc drives and who rate our heroes by big brainpower rather than big firepower. It's an Internet user's spy novel where the good guys and bad guys struggle over secrets somewhat more intellectual than just where the secret formula is hidden--they have to gain understanding of what the secret formula actually is.Read more

    Reviews (824)

    3-0 out of 5 stars Enjoyable but flawed techo-thriller
    The National Security Agency's new and mighty code-cracking computer, TRANSLTR, has been working on a single puzzle for so long that the top cryptographer at "No Such Agency" (as it's nicknamed) can't believe her eyes when she sees its time elapsed counter. Her boss, Deputy Director Strathmore, has called her in on a Saturday because he trusts his protege to help him obtain the algorithm's pass-key without letting anyone else know what's going on. This algorithm, called Digital Fortress, is billed by its creator - a disgruntled and idealistic former NSA employee - as the only uncrackable encryption code ever written. Strathmore has fed it into TRANSLTR to test that claim. He must have the pass-key to carry out his plan for Digital Fortress, assuming it really can't be broken.
    3-0 out of 5 stars Abridged CD was interesting, but...
    Digital Fortress, the CD, was narrated by Bruce Sabath.Since I haven't read the unabridged version (and haven't read any other reviews of the abridged version), I can't comment whether the editors make a so-so story better or worse by cutting it down.In the abridged version, perhaps the unbelievable occurrences were tempered by the interest I had in the workings (real or imagined) of the ultra-secret NSA and the code-breakers.
    2-0 out of 5 stars a little too far fetched
    Maybe it's just the geek in me crying out for mercy, but I find a lot of the details of this book pretty far-fetched.Plus, after we figured out whodunit and such, it just seemed to drag on forever.I ended up skimming the last 30 pages or so just to get it over with.
    Read more

    Subjects:  1. Computer security    2. Cryptographers    3. Espionage/Intrigue    4. Fiction    5. Fiction - General    6. General    7. Intelligence officers    8. Technological    9. Thrillers    10. Science fiction   


    8. Security Engineering: A Guide to Building Dependable Distributed Systems
    by Wiley
    Paperback (22 January, 2001)
    list price: $75.00 -- our price: $57.00
    (price subject to change: see help)
    Isbn: 0471389226
    Average Customer Review: 5.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Editorial Review

    Gigantically comprehensive and carefully researched, Read more

    Reviews (24)

    5-0 out of 5 stars Available for free
    Before purchasing this book, you might like to browse through its contents.It is available in its entirety for free on the author's website.Here's the URL:
    3-0 out of 5 stars More high-level concepts and less hands-on guidance
    This is certainly a good book for getting introduced to most high-level architectural concepts related to Network security, cryptography, mandatory/multi-level access control etc. From a application development perspective, this book falls short on how to build architecure, design and implement them into your business applications which ultimately meets the end-user. The author justifies the high-level concepts well enough from a generalist perspective, but the industry-standards from OASIS leans towards standards-based application security protocols..which pushes a developer/architect like me to take those suggestions first and how to apply them in real world.The book also does'nt address on how-to build security for emerging application architectures based on Service-oriented architecture (SOA), Identity Management, Net-centric Federated applications. As a developer/architect using Java or Microsoft .NET or open-source based distributed applications, I need guidance on how to implement the recommended concepts (in the book) for example using biometrics or smartcards for building multi-factor access control at my application-level...unfortunately I don't find any answers for real-world implementation.

    5-0 out of 5 stars Best security book on the market
    This book is a must own and a must read.Ross Anderson may tweak people's noses on occassion...but usually because they need tweaking.Get this book now.Really. ... Read more

    Subjects:  1. Computer Books And Software    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Computer Security    6. Computers - General Information    7. Distributed Computer Systems    8. Distributed processing    9. Electronic data processing    10. Management Information Systems    11. Networking - General    12. Programming - Systems Analysis & Design    13. Security - General    14. Computers / Networking / General    15. Data security & data encryption    16. Network security   


    9. Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
    by Wiley
    Paperback (18 October, 1995)
    list price: $60.00 -- our price: $48.00
    (price subject to change: see help)
    Isbn: 0471117099
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Editorial Review

    Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Read more

    Reviews (96)

    5-0 out of 5 stars A must-have book for understanding Cryptography.
    This book has really shed a lot of light on cryptography for me. I honestly can't put it down--I wish I had paid more attention in my statistics classes so I could be able to apply some of the stuff the author talks about better. I am about half way through the book, and I haven't gotten to the point where it's more of a chore than a pleasure to read it (something I can't about my other technical books).
    5-0 out of 5 stars Prepare to drink from the firehose
    This book is really incredible.When it was first published in the mid-90's, there was almost no material available on the subject of cryptography.Now, ten years later, there are dozens, if not hundreds, of books riding on Schneier's coattails - but almost none have anything new or useful to say.Impeccably researched (with 1,653 references!) and unarguably complete, Schneier's expertise in theoretical mathematics, experience as a practitioner, and razor-sharp lucidity combine to make this the only book you'll ever need on the subject of cryptography.

    5-0 out of 5 stars Text Book for School
    The book was in excellent condition.The book came within the alloted time period.No complaints! ... Read more

    Subjects:  1. Computer Books: General    2. Computer security    3. Computers - Computer Security    4. Computers - Languages / Programming    5. Cryptography    6. Discrete Mathematics    7. Programming Languages - General    8. Security - General    9. Security measures    10. Telecommunication    11. Computers / Security    12. Data security & data encryption   


    10. Financial Instrument Pricing Using C++ (The Wiley Finance Series)
    by John Wiley & Sons
    Hardcover (27 August, 2004)
    list price: $120.00 -- our price: $96.00
    (price subject to change: see help)
    Isbn: 0470855096
    Sales Rank: 43246
    Average Customer Review: 5.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (3)

    5-0 out of 5 stars very good book.
    implementation and design of classes wise this book is replete with ideas. Since this book dealt with FDM, which are either cubbersome or difficult to program say american options, better is to deal with FE methods.

    5-0 out of 5 stars Computational Finance made efficient
    This book encapsulates all that is wonderful about OOP and shows how generic programming techniques (based on the STL) can be effectively applied to financial engineering and numerical analytic problems. The book requires only a first-course level knowledge of C++ (at the level of for example Ivor Horton's Beginning C++) and a first course level knowledge of Financial Mathematics (at the level of for example John Hull's masterpiece) and takes the reader on an entertaining journey through the basics of the STL and the applications of STL constructs to computational-financial and numerical-analytic problems, especially those relating to the numerical solution of partial differential equations. Also, the author makes a persuasive case for finite-difference methods and deals with a few subtleties of the Crank-Nicholson algorithm. For best results, it should be read along with a decent book on the Standard Library (for example the one by Nicolai Josuttis). Overall, it's a pleasure to read and learn from, on a par with Mark Joshi's little design-patterns volume, and more detailed!

    5-0 out of 5 stars The best book in c++ instrument pricing, period.
    Let me just say that I have a few financial modelling books, from Dr. Brooks to Mr. Joshi, and this is the best book by far.It clearly explain how to price a particular instruments using this poweful language.The book uses Standard Template Language (STL), by doing so your code are more readable and much faster.If I only had this book a few years back.Now I must say this book is for C++ programmers and Quants you really need to know C++ from beginning to end, templates, pointers, references, classes or that stuff you need it. This is the only book that comes with working code, it doesn't matter what type of compiler you have the code in the CD will work.Mr. Duffy explains how to model one factor and two factor Black-Scholes equations using finite differences, options(vanilla, exotic),interest rate and much more.The CD even comes with an Excel driver to transfer your data to Excel. Quant superstar Justin London is coming with his new book in a few months, and that book might over take this one, but as of right now this is the best C++ financial pricing book around.You can't go wrong with this one. ... Read more

    Subjects:  1. Business & Economics    2. Business / Economics / Finance    3. Business/Economics    4. C++ (Computer program language    5. C++ (Computer program language)    6. Finance    7. Financial engineering    8. Investments    9. Investments & Securities - General    10. Mathematical models    11. Securities    12. Business & Economics / Finance    13. Computer Software Packages    14. Investment & securities    15. Software engineering   


    11. Advanced modelling in finance using Excel and VBA
    by John Wiley & Sons
    Hardcover (30 May, 2001)
    list price: $95.00 -- our price: $59.85
    (price subject to change: see help)
    Isbn: 0471499226
    Sales Rank: 10822
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (11)

    5-0 out of 5 stars Absolutely Great!
    Advanced Modeling is a fantastic book, and pretty easy to follow with relatively few coding errors.There are some books out there that have errors in the code that they use, which makes it difficult or someone to learn the techniques.Even for those without a solid background in VBA, this book can benefit you to start learning how to code properly.Anyone who is relatively proficient with Excel can definitely gain a new trick or two from reading this book.All you really need to start using this book is a basic understanding of finance concepts (e.g. portolio theory, capital budgeting, binomial options pricing, Black-Scholes, etc.).The techniques that are taught are also useful in other modeling exercises, and not necessarily just for finance-related topics.

    5-0 out of 5 stars A Cookbook for Financial Modellers
    Yes, the book won't teach you CAPM, Black-Scholes, or much financial theory.But there is NO shortage of those books.There is a shortage of books with real-world Excel solutions to applying financial theory to data.I've had this book for a couple of years and have probably only used 10% of it, only because I don't have time, real business need, to do the rest.I sometimes take it to bed to read and dream of having the time to try out some of their other models.That's the only thing I can add to the other reviews here, the amount of love and passion for the subject put into this book.There's not one extra padded word or graphic in this book.Yes, if there was one book I'd have to take to a desert island with Excel and some financial data this would be it.

    3-0 out of 5 stars Not really satisfying
    One of the main points of programming books is to help the reader understand the models being programmed.On this count, "Advanced modelling in finance using Excel and VBA" fails miserably.There is very little explanation of the financial concepts and models.Anyone hoping to learn finance from this book will be very disappointed.Read more

    Subjects:  1. Accounting - General    2. Applied    3. Business & Economics    4. Business / Economics / Finance    5. Business/Economics    6. Economics - General    7. Finance    8. Financial Economics (General)    9. General    10. Mathematical Models In Economics    11. Mathematical models    12. Microsoft Excel (Computer file    13. Microsoft Excel (Computer file)    14. Microsoft Visual Basic for app    15. Microsoft Visual Basic for applications    16. Business & Economics / Finance    17. Excel    18. Investment & securities   


    12. Mind Hacks: Tips & Tools for Using Your Brain (Hacks)
    by O'Reilly Media
    Paperback (22 November, 2004)
    list price: $24.95 -- our price: $16.47
    (price subject to change: see help)
    Isbn: 0596007795
    Sales Rank: 12783
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Features

    • Illustrated

    Reviews (18)

    4-0 out of 5 stars Mind Hacks: Tips & Tools for Using Your Brain
    It's a book very interested about language in mind and speech comprehension. I read a short comment in BBC Focus magazine and I wish to read because it's very easy to learn the misteries of mind in cognitive science applied to language and psichology.

    4-0 out of 5 stars A fun book
    It is not a typical "hacks" book in that it does not tell you how to utilize you brain more effectively or do neat things.It *does*have a lot of exercises that show you cool things on how your brain works with sections describing how your brain works - and a number of experiments (blind spot, Magnet interaction with the brain, word parsing in the the mind, and so on). This book goes very well with a recent title called _Mind Wide Open_ by Steven Johnson.
    5-0 out of 5 stars Interesting reading
    I found this book to be interesting in the way that it presents it's topics. It was insightful and worth the purchase. It is the type of book that you select chapters that interest you as opposed to going cover to cover. ... Read more

    Subjects:  1. Brain    2. Cognitive Psychology    3. Computer Books: General    4. Computers    5. Neuropsychology    6. Popular works    7. Psychology    8. Security - General    9. Thought and thnking    10. Attention    11. Cognitive theory, metacognition, vision, audition, motor skills, brain research, cortex, metacortex, sensori-motor    12. Computers / Social Aspects / Human-Computer Interaction    13. Data security & data encryption    14. Listening    15. Movement, Psychology of    16. Network security    17. Psychology & Psychiatry / Neuropsychology    18. Psychology/Cognitive Psychology    19. Reasoning    20. Thought and thinking    21. Visual perception   


    13. Rootkits: Subverting the Windows Kernel
    by Addison-Wesley Professional
    Paperback (22 July, 2005)
    list price: $44.99 -- our price: $29.69
    (price subject to change: see help)
    Isbn: 0321294319
    Sales Rank: 5370
    Average Customer Review: 5.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (16)

    5-0 out of 5 stars Welcome to the future
    If you don't own this book, then the world will one day 0wn you.Buy this book today and learn from the masters about the ultimate tool in the attacker's toolkit.Greg Hoglund's work is essential to computer security.It behooves us all to understand it.
    5-0 out of 5 stars Rootkit insights
    One of the first books to go deeper in to rootkits of its kind.Not many books out there to give a understanding to IAT, SSDT, hooks, trampoline functions, and its relationship to rootkits.
    3-0 out of 5 stars Not a book for Kernel Driver Developer
    This book tells me what RootKit really means. One useful thing I got from this book was that in Windows Kernel even simple code can be used against security. And that's it. Most techniques in this book are primitive to kernel developers. I don't recommend this book to serious kernel driver developers. "Windows Internals" and OSR Online should be the way to go. ... Read more

    Subjects:  1. Access control    2. Computer - Internet    3. Computer Books: Internet General    4. Computer Data Security    5. Computer security    6. Computers    7. Internet - Security    8. Microcomputer Operating Environments    9. Computers / Internet / Security    10. Data security & data encryption    11. Network security   


    14. Gray Hat Hacking : The Ethical Hacker's Handbook
    by McGraw-Hill Osborne Media
    Paperback (09 November, 2004)
    list price: $49.99 -- our price: $32.99
    (price subject to change: see help)
    Isbn: 0072257091
    Sales Rank: 10381
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (12)

    5-0 out of 5 stars i love GHH
    i have read tonnes of books on this subject.starting from secrets of a super hacker by knightmare(published way back in 94, trust me dat was a great read n even 2day i find myself glued to da back as the first time i read it.now coming back 2 gray hat hacking.this is wat i would like 2 call the hacking reference book for the next generation.every one concerned about security should consider picking up this book.u might as well save some money n picking up more knowledge than any of the hacking exposed books in the market.no this book is not for button clicking script kiddies who play around wid trojans n claim to be hackers or web defacers(lamers).if u belong to da breed of script kiddies pick up this disgustin book by ankit fadia (oh by the way ive reviewed it).i wouuld liek to congradulate the authors for the outstanding work put into this book.howeever it would be great to see expanded materials on various topics and a little more detail in tool description.its not bad but it could still be better.so as i said before get dis book u wont regret it.so kiddies grow up keep those hacking exposed n ankit fadias books apart throw em in da firplace burn em do anythin .but go get dis one
    4-0 out of 5 stars Covers more than the typical hacking book
    "Gray Hat Hacking - The Ethical Hacker's Handbook" is not your normal hacking book.This book should not be lumped in with the "Hacking Exposed" series nor the likes of "Counter Hack".What differentiates Gray Hat Hacking (GHH) from other books is the amount of code the book offers.This book is not for script kiddies, but instead shows how to advance to the next level of hacking (and, more importantly, prevention) by devoting over 100 pages to developing programming skills for both Linux and Window exploits.I had not encountered a book that dedicated this much space to scripting.
    5-0 out of 5 stars Great buy for every IT dept.
    I bought this book from a store in D.C, and read it on my way back to India. I was impressed. Never found any book that deals with computer security and software vulnerabilities written so well. The reason I like this book is than others is because it does not only give you information that can help you in assessing your network security, but also gives you a basic introduction to the laws and legal technicalities. The contents of this book cover most of computer/network security related areas including technical implementation, planning, and defense. Therefore, it is not only for system engineers, but also for people managing IT departments.
    Read more

    Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Security - General    5. Computers / Security    6. Data security & data encryption    7. Network security   


    15. IPv6 Essentials
    by O'Reilly Media
    Paperback (17 May, 2006)
    list price: $44.99 -- our price: $37.34
    (price subject to change: see help)
    Isbn: 0596100582
    Sales Rank: 10842
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Features

    • Illustrated

    Reviews (12)

    5-0 out of 5 stars VERY VERY HIGHLY RECOMMENDED!!
    Are you interested in wanting to understand and implement the IPv6 protocol! If you are, then this book is for you. Author Silvia Hagen, has done an outstanding job of writing a book that covers IPv6 in detail and explains all of the new features and functions.
    5-0 out of 5 stars Excellent discussion of IPv6 protocols
    I read and reviewed "IPv6 Network Administration" (INA) in August 2005 and "Running IPv6" (RI) in January 2006.I gave those books 5 stars, so I had high expectations for "IPv6 Essentials, 2nd Ed" (IE2E).INA and RI are very hands-on, implementation-specific books.IE2E is more concerned with explaining protocols and IPv6 features.In this respect, IE2E is the perfect complement to INA and RI.
    5-0 out of 5 stars Excellent 2nd edition contains lots of practical information
    Internet Protocol version 6 (IPv6) is a network layer standard used by electronic devices to exchange data across a packet-switched internetwork and is intended to provide more addresses for networked devices, allowing, for example, each cell phone and mobile electronic device to have its own address. IPv6 is actually capable of supporting5×10^28 addresses for each of the roughly 6.5 billion people alive today.
    Read more

    Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Networks    4. Computers    5. Computers - Communications / Networking    6. Internet - General    7. Internet - Security    8. Networking - Network Protocols    9. Computer / Internet    10. Computers / Networking / Network Protocols    11. Computers/Internet - General    12. Networking standards & protocols    13. TCP/IP (Computer network protocol)    14. ipv6, network, internet, protocol   


    16. SUSE LINUX Enterprise Server 9 Administrator's Handbook
    by Novell Press
    Paperback (29 June, 2005)
    list price: $49.99 -- our price: $32.99
    (price subject to change: see help)
    Isbn: 067232735X
    Sales Rank: 401223
    Average Customer Review: 4.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (1)

    4-0 out of 5 stars securing your system
    Kuo and Beland help the sysadmin who might be new to SUSE Linux. Conceptually, you can think of the book as two interwoved parts. The first part is explaining generic linux, or even unix, operations. Applicable to a Red Hat or Solaris machine, perhaps.
    Read more

    Subjects:  1. Client-Server Computing - General    2. Computer Books: Operating Systems    3. Computers    4. Computers - Operating Systems    5. Operating Systems - Linux    6. Computers / Operating Systems / Linux    7. Network security    8. Unix, Unix Linux & Unix TCL/TK   


    17. Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
    by No Starch Press
    Paperback (15 April, 2005)
    list price: $39.95 -- our price: $25.17
    (price subject to change: see help)
    Isbn: 1593270461
    Sales Rank: 29383
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Features

    • Illustrated

    Reviews (16)

    4-0 out of 5 stars Interesting and detailed
    Zalewski offers a nice overview of passive information extraction techniques. Each section covers one approach to the problem of determining something about someone's computer use without being detected. He provides an overview of the technology involved and then talks about how to exploit it.
    3-0 out of 5 stars Interesting
    This is one of those books that you go HMMMMMM!!! Very Interesting, but most of the things in the book are hard to understand. Also, he jumps around alot like if he's having a conversation rather than an inside manual to Attacks.

    5-0 out of 5 stars Ages well
    This is one of the few information security books that seem to age well: I reread it after over a year, and it still appears to be quite refreshing and up to date. This only goes to show the difference between books written out of genuine passion, and the rest. Big kudos to the author. ... Read more

    Subjects:  1. Computer Books: General    2. Computer networks    3. Computers    4. Computers - Computer Security    5. Security - General    6. Security measures    7. Computers / Computer Security    8. Computers / Security    9. Data security & data encryption    10. Network security    11. security, privacy, network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, forensics   


    18. Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
    by Cisco Press
    Paperback (14 October, 2005)
    list price: $70.00 -- our price: $55.73
    (price subject to change: see help)
    Isbn: 1587052091
    Sales Rank: 18217
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (6)

    5-0 out of 5 stars Good reference
    This book helped me a lot. I recently deployed over 250 ASAs and was running into a lot of problems with the IPS SSM and VPN features. I got most of my answers from this book.

    1-0 out of 5 stars Very Amatuer
    What a waste of time it was reading this book. If you are not very familiar with FW/IPS or VPN then this may be helpful, but if you have been working with this technology and Cisco's products that address these technologies (ASA, PIX, IPS, VPN3k) then please don't refer to this joke. Go online to cisco.com and do the research. Sometimes it felt as if whitepapers were copied and pasted.
    5-0 out of 5 stars Excellent Book on Cisco ASA.
    I bought this book 2 weeks back for an ASA project that my company is going to deploy. I am really amused to see that each chapter starts off with an in-depth architectural overview of the features to be discussed. It then provides full step-by-step configuration examples with lots of deployment scenarios. It even covers many troubleshooting and monitoring examples that helped me a lot when I started deploying it in my lab network
    Read more

    Subjects:  1. Certification Guides - Cisco    2. Computer - Internet    3. Computer Books: General    4. Computer Data Security    5. Computer Network Management    6. Computers    7. Internet - Security    8. Networking - General    9. Security - General    10. Computers / Internet / Security    11. Internet    12. Network security   


    19. Transaction Processing: Concepts and Techniques (The Morgan Kaufmann Series in Data Management Systems)
    by Morgan Kaufmann
    Hardcover (1993)
    list price: $110.00 -- our price: $110.00
    (price subject to change: see help)
    Isbn: 1558601902
    Average Customer Review: 5.0 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Editorial Review

    This is the one book you ought to have if you want to expand your knowledge of online transaction processing (OLTP) and learn how to apply it to the real world. Read more

    Reviews (8)

    5-0 out of 5 stars This is the bible for Transaction Processing!
    This book is the base for all who want to be a Gurus in a bigs systems OLTP with hundreds of TPS and hundreds or thousands of customes conected doing transactions or using a terminals. This is a book that you mast have mandatorily.

    5-0 out of 5 stars This book is a revelation
    God himself has spoken. You will understand what is the difference between real computer science (Jim Gray) and changing configuration values at random in your MySQL setup (Jeremy Zawodny style)

    5-0 out of 5 stars Perfect
    Well organized, complete, nontrivial, wealth of sample code, interesting historical notes, good index. Magnificent work. Definitely worth the money. ... Read more

    Subjects:  1. Computer Books: General    2. Computers    3. Computers - Data Base Management    4. Data Processing - General    5. Database Management - General    6. Distributed Computer Systems    7. Information Storage & Retrieval    8. Transaction systems (Computer    9. Transaction systems (Computer systems)    10. Computers / Information Storage & Retrieval    11. General Theory of Computing    12. Investment & securities   


    20. Handbook of Applied Cryptography
    Hardcover (16 October, 1996)
    list price: $79.95 -- our price: $71.96
    (price subject to change: see help)
    Isbn: 0849385237
    Sales Rank: 175255
    Average Customer Review: 4.5 out of 5 stars
    US | Canada | United Kingdom | Germany | France | Japan

    Reviews (16)

    5-0 out of 5 stars Advanced Crypto for the college mind.
    This very detailed work is not for the light hearted. It's an in depth look at the mathmatics behind cryptography. If you're looking for a book to help you program then look for Applied Cryptography by Bruce the crypto king instead. If you're looking for something to help you learn cryptoanalysis and how to break codes then this is the first step.

    5-0 out of 5 stars Fantastic traditional reference
    The Chapter 14 - Efficient Implementation - shows several multiple precision algorithms. They are very easy to understand and implement under any microprocessor. It is a very good complement to the book set written by Donald Knuth (The Art of Computer Programming, Volumes 1-3 Boxed Set), another fantastic traditional reference.

    4-0 out of 5 stars A very detailed book, but not for everyone.
    This is a fairly strong book on crypto, with heavy detail on the math involved.The upside is that the second chapter is devoted to most of the important mathematical theory you'll need to understand for the rest of the book.The downside?That chapter tries to cover just about the same breadth of information as a semester long course in Number Theory.Read more

    Subjects:  1. Access control    2. Algorithms (Computer Programming)    3. Computers    4. Computers - Computer Security    5. Cryptography    6. Cryptography/Access Control    7. Discrete Mathematics    8. Handbooks, manuals, etc    9. Reference    10. Security - General    11. Applications of Computing    12. Applied mathematics    13. Data security & data encryption    14. Mathematical theory of computation    15. Mathematics / Combinatorics   


    1-20 of 200       1   2   3   4   5   6   7   8   9   10   Next 20
    Prices listed on this site are subject to change without notice.
    Questions on ordering or shipping? click here for help.

    Top