BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Web Development - Security & Encryption

21-40 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$16.29
21. How to Be Invisible: The Essential
$29.67
22. Programming .NET Components, 2nd
$32.99
23. Hacking Exposed 5th Edition (Hacking
$32.99
24. Active Directory, 3rd Edition
$32.99
25. Real Digital Forensics: Computer
$37.80
26. The CISM Prep Guide: Mastering
$61.50
27. The Complete Cisco VPN Configuration
$31.50
28. Practical Cryptography
$34.39
29. Cryptography Decrypted
$37.79
30. MicrosoftWindows Server(TM) 2003
$9.95
31. Linux Pocket Guide
$37.79
32. Core Security Patterns: Best Practices
$73.10
33. Management of Information Security
$32.99
34. Counter Hack Reloaded: A Step-by-Step
$47.88
35. The CISSP Prep Guide: Gold Edition
$32.99
36. Writing Secure Code, Second Edition
$37.79
37. Microsoft Internet Security and
$132.40
38. Corporate Computer and Network
$32.97
39. Stealing the Network: How to Own
$22.04
40. How to Break Web Software: Functional

21. How to Be Invisible: The Essential Guide to Protecting Your Personal Privacy, Your Assets, and Your Life (Revised Edition)
by Thomas Dunne Books
Hardcover (March, 2004)
list price: $23.95 -- our price: $16.29
(price subject to change: see help)
Isbn: 0312319061
Sales Rank: 5121
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (32)

3-0 out of 5 stars Outdated. Some examples are not practical
Somewhat outdated.
5-0 out of 5 stars Solid advice from a true believer
I carefully read the first edition of the book approximately 7 years ago.Though I didn't perceive at the time that I had a need for "invisibility", I adopted several of the recommendations in the book simply because they made me feel more comfortable.I was subsequently harrassed by a disgruntled former employee.At least one overt act of his was thwarted by my privacy measures.How many others, I'll never know.Every bit of energy and money I'd invested in my privacy was paid back and then some.
5-0 out of 5 stars Excellent book on Privacy Techniques!
This is an excellent book on privacy techniques.What I like about it is that JJ Luna discusses various levels of privacy, and I have found that the more privacy you want, the more time/effort you will have to go through to maintain it.He talks about how to go about receiving your mail, where to choose to live, how use the phone, how to pay people, and how to title assets more privately.I like this book because JJ Luna does not try to force a one size fits all agenda upon people, but lets the reader decide on what level of privacy is right for them. There are varying levels of privacy which can be obtained for each one, depending on your circumstances (e.g. family, job, etc).Of course, the more privacy you want, the more you will have to sacrifice, but most of these techniques are simple and won't take too much extra time out of your week.
Read more

Subjects:  1. Business & Economics    2. Computer security    3. Identification    4. Personal Finance    5. Personal Finance - General    6. Political Freedom & Security - Civil Rights    7. Politics / Current Events    8. Privacy, Right of    9. Right of privacy    10. United States   


22. Programming .NET Components, 2nd Edition
by O'Reilly Media
Paperback (01 July, 2005)
list price: $44.95 -- our price: $29.67
(price subject to change: see help)
Isbn: 0596102070
Sales Rank: 3080
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (54)

5-0 out of 5 stars Simply Awesome
This is the my first review on Amazon. This book is so nicely written. The examples are short and precise. All the Advanced topics are covered in a great way. Highly recommend it to all developers who want to gain more expertise.

5-0 out of 5 stars The best .net book I have read so far
this book brought me out of the darkness into the light.
5-0 out of 5 stars Great coverage of complex material
L�wy's book does a great job covering some complex, arcane topics.He nicely lays out fundamentals on interface-based design and development, then moves on to clearly cover tough topics like remoting and multithreading.
Read more

Subjects:  1. Computer Books: Operating Systems    2. Computers    3. Computers - Operating Systems    4. Microcomputer Application Software    5. Operating Systems - Windows    6. Programming - General    7. Programming - Software Development    8. Programming Languages - C#    9. Computer Programming    10. Computers / Operating Systems    11. Computers / Operating Systems / Windows    12. Computers/Programming - Software Development    13. Computers/Programming Languages - C#    14. Computers/Programming Languages - Visual BASIC    15. com, com+, component, .net, .net component, component services, regional director, software legend, component oriented, component-oriented programming, dll, assemblies, binary component, object-oriented, interface based, encapsulation, polymorphism, reuse, dll hell, security, attributes   


23. Hacking Exposed 5th Edition (Hacking Exposed)
by McGraw-Hill Osborne Media
Paperback (19 April, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072260815
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

A lot of computer-security textbooks approach the subject from adefensive point of view. "Do this, and probably you'll survive a particular kindof attack," they say. In refreshing contrast, Read more

Reviews (82)

5-0 out of 5 stars Information Security
I had to purchase this book for college but it is a great read. One of the only textbooks that I have used that was actually interesting. They give clear examples and make it easy to follow thier explanations. Great book if you want to learn about hacking and some of the issues it involves.

3-0 out of 5 stars Still solid but redundant and a bit tired
I cannot say anything more that other positive reviews have not already said.
3-0 out of 5 stars Good, but aging
The book is not bad, but needs serious rewriting. The "fifth edition" is a joke-it looks more like an attempt to beat some more money out of the book's reputation than a serious release.
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Computer Security    7. Data protection    8. Internet - Security    9. Networking - General    10. Security - General    11. Security measures    12. Computer Communications & Networking    13. Computer fraud & hacking    14. Computers / Security    15. Data security & data encryption   


24. Active Directory, 3rd Edition
by O'Reilly Media
Paperback (19 January, 2006)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0596101732
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Read more

Features

  • Illustrated

Reviews (28)

2-0 out of 5 stars Miserable dictionary of doublespeak
Not recommended for native speakers of the English language.
5-0 out of 5 stars The overall pros and cons of Active Directory, common tips and traps, and more
Joe Richards, Robbie Allen and Alistair G. Lowe-Norris' Active Directory, 3rd Edition is also for Windows administrators who may know all to well about the problems it's brought to prior versions of windows. This edition considers the Directory for Windows 2000, 2003 and its updates, considering the overall pros and cons of Active Directory, common tips and traps, and more. Yes, you can use Microsoft's documentation for many similar answers; but here they are arranged in a more logical manner and provide more candid assessments to help users upgrade or understand options.
5-0 out of 5 stars Great book but there is a new edition
This is the leading reference for Active Directory but it has been updated to a third edition, so you should get that one. ... Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Communications / Networking    4. Directory services (Computer network technology)    5. Local area networks (Computer networks)    6. Management    7. Networking - General    8. Operating Systems - Windows    9. Operating systems (Computers)    10. Security - General    11. AD,Active Directory, Windows Server, Windows administration, LDAP, DNS, ADS, Group Policy, ADAM    12. Computers / Communications / Networking    13. Computers / Networking / General    14. Directory services (Computer network technolo    15. Microsoft Windows   


25. Real Digital Forensics: Computer Security and Incident Response
by Addison-Wesley Professional
Paperback (23 September, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0321240693
Sales Rank: 24501
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars Excellent Read
This book is written in such a style that is easy to understand, yet technical and detailed enough to maintain your interest and attention all the way through.
5-0 out of 5 stars This one is a keeper!
As an author and instructor, I tend to be pretty picky about the books I choose to read and use in my classes. The authors present the material in a good logical progression. I especially like that it also provides sample evidence on the DVD. Most of the computer forensic books that currently exist contain mostly theory. This is the first good hands-on text that I have seen.
5-0 out of 5 stars An essential A-Z guide for forensic investigations
There is a real lack of well written books in this category, and this one stands out because it is comprehensive, yet easy to digest and carefully laid out, including case studies to understand data capture and analysis techniques.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Crime    4. Computer Data Security    5. Computer crimes    6. Computer networks    7. Computer security    8. Computers    9. Internet - Security    10. Investigation    11. Security measures    12. Computers / Internet / Security    13. Data security & data encryption   


26. The CISM Prep Guide: Mastering the Five Domains of Information Security Management
by John Wiley & Sons
Paperback (30 May, 2003)
list price: $60.00 -- our price: $37.80
(price subject to change: see help)
Isbn: 0471455989
Sales Rank: 106778
Average Customer Review: 2.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

1-0 out of 5 stars Outdated beyond usefulness.
Be advised:this book may have been relevant a couple years ago, but not anymore.ISACA has updated and slightly reorganized the exam.I believe this book actually interferred with my prep.The ISACA study guides and applicable experience are plenty to pass this exam (worked for me).Good luck.

3-0 out of 5 stars CISSP or CISM?
I bought this book because there is no other book available (prep guide) that covers the CISM.As I read through the book there is an explicit sentence that reads "to better prepare you for the CISSP exam"; which test is this preg guide for?If you're going to cut and paste from similar works you've done in the past at least do the readers a favor and use the find/replace all function :).Overall it was a good read and I'll keep it around as a reference.

3-0 out of 5 stars Question Errata Link
Co-author here. It has been brought to Dr. Krutz' and my attention that several errors in the CD questions were not corrected per our instructions prior to publication. Wiley has published a link to the CISM Prep Guide question errata sheet @:Read more

Subjects:  1. Certification    2. Certification Guides - General    3. Computer Bks - Communications / Networking    4. Computer Books And Software    5. Computer Data Security    6. Computer security    7. Computers    8. Computers - Computer Security    9. Electronic data processing per    10. Electronic data processing personnel    11. Examinations    12. Management    13. Networking - General    14. Security - General    15. Study guides    16. Computers / Security    17. Data security & data encryption    18. Network security    19. Privacy & data protection   


27. The Complete Cisco VPN Configuration Guide
by Cisco Press
Paperback (15 December, 2005)
list price: $75.00 -- our price: $61.50
(price subject to change: see help)
Isbn: 1587052040
Sales Rank: 20733
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars Excellent resource for security professionals
Richard Deal's book, The Complete Cisco VPN Configuration Guide, sets out to provide a comprehensive reference for networking professionals designing, deploying, and managing VPN solutions.This book covers the foundational information as well as step by step guides to configuring VPN solutions on Cisco VPN Concentrators, software and hardware clients, Cisco IOS routers, and Cisco PIX and ASA appliances.
5-0 out of 5 stars The Best Cisco VPN Configuration Book
Richard Deal's "The Complete Cisco VPN Configuration Guide" provides a complete step by step guide on how to configure VPN on Cisco Concentrators, software (including Windows VPN client) and hardware client, IOS routers, PIX and ASA security appliances.
4-0 out of 5 stars A useful read for security professionals
A thorough and complete review of VPN technologies, as implemented in Cisco infrastructure,Deal's `The Complete Cisco VPN Configuration Guide', is arranged as a twenty three chapter step by step technology review and one chapter of bonus case studies.
Read more

Subjects:  1. Computer - Internet    2. Computer Architecture    3. Computer Architecture - General    4. Computer Books: General    5. Computers    6. Internet - Security    7. Networking - Intranets & Extranets    8. Computers / Internet / Security    9. Network security   


28. Practical Cryptography
by Wiley
Paperback (28 March, 2003)
list price: $50.00 -- our price: $31.50
(price subject to change: see help)
Isbn: 0471223573
Sales Rank: 55997
Average Customer Review: 3.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (15)

3-0 out of 5 stars Biased to Schneier's algorithms
This can be an annoying book for a serious developer, but I do know Writing a secure cryptosystem is very hard. People should be aware that it is hard, and they are likely to make mistakes. It isn't something that should be attempted lightly. If you are doing some actual work, it's not a good one. The book does not cover sufficient mathematic knowledge, and the edit is bit horrible as well. The authors chose to support their own algorithm shedding less light on AES and even RSA. That really made me stop reading this book.
3-0 out of 5 stars Self contradictory and selflauding
From the very first pages, authors emphasize the need for public algorithms and peer review. Yet, the book is full of suggestions that appear first time in the book. They even take time to give fancy names to their new proposals. It is typical to see things like "While writing this chaper we came up with this new random number generator...". Well, the authors could have used some of public scrutiny they are so fond of.
3-0 out of 5 stars Must be used with Applied Cryptography
As one other reader pointed out this book can be called Applied Cryptography Light. It is true, it gives you more theory and very little math. I did not like this book by itself since I was interested in actual implementation and i wanted to see full algorithms and math. I did end up buying Applied Cryptography and those 2 books combined provide an excellent reference. I was not able to give more than 3 stars since I did not feel i got any knowledge out of this book to be able to apply it in real life except reading: "Cryptography is hard, you might need to hire an expert..." while I want to become an expert myself one day! ... Read more

Subjects:  1. Computer Books: General    2. Computer security    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Cryptography    7. Internet - General    8. Networking - General    9. Security - General    10. Computers / Security    11. Data security & data encryption    12. Privacy & data protection   


29. Cryptography Decrypted
by Addison-Wesley Professional
Paperback (21 December, 2000)
list price: $39.99 -- our price: $34.39
(price subject to change: see help)
Isbn: 0201616475
Sales Rank: 96835
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (32)

5-0 out of 5 stars Wonderful book explaining all the secret s of secure communication
Cryptography Decrypted is an easy to read and fun book that explains how cryptography has evolved from Caesar's time to now. The author goes over how encryption is used in all areas of communication, and what sequential systems have deveoped to stop hacker attacks along the way. It is detailed but fun to read, and explains how all the enigmatic parts, like Private Keys, Public Keys, Secret Keys, Digital Signatures, SMIME, PGP, RSA, SHA-1 ect. all fit together.
5-0 out of 5 stars Simply THE BEST!!!
This book is phenomenal! I skimmed through countless books on cryptography before I settled on this one. The authors Mel and Baker have the unique ability to make a complex subject like cryptography completely accessible even to the mathematically challenged. This book is a MUST READ! If you work in the IT Security or Network Design field, this book gives you all the background you need to be more effective in your job without having the turgid style of most crypto books. It really does a fantastic job of explaining all the basic building blocks of cryptography as well as suites like SSL and IPSEC in plain everyday language. You will not be disappointed with this book!

5-0 out of 5 stars Good first book on security
Excellent book for people who want to understand in nutshell what security is all about. If you are overwhelmed by several security terms and want to know how things fit in a bigger picture, this is the book for you. ... Read more

Subjects:  1. Computer security    2. Computers    3. Computers - Communications / Networking    4. Cryptography    5. Cryptography/Access Control    6. Language    7. Security - General    8. Coding theory & cryptology    9. Computers / Internet / Security    10. Data security & data encryption    11. Network security   


30. MicrosoftWindows Server(TM) 2003 PKI and Certificate Security (Pro - One-Offs)
by Microsoft Press
Paperback (07 July, 2004)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 0735620210
Sales Rank: 9758
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Empowering, Clear, and Consise
I have to say that this book is simply amazing.I have searched the longest to clearly understand not just about PKI, but actually how to implement it, and was always referred to tombs of mathematical theory and such.This book demystifies PKI infrastructure in clear and concise explanations (but not overkill though), and has a lot of material on how to practically implement a variety of PKI architectures that can fit small businesses to huge enterprise corporations.
4-0 out of 5 stars Bset book I've seen on PKI and certificate management
Brian Komar tackles, what I've seen countless other authors refer to as a difficult to understand subject matter.It appearantly took a whole team at Microsoft to explain it to him, but it looks like he got it right.Of the many books I've read that address certificates and PKI this is the only one I've seen that presents a complete picture, where I didn't walk away wondering... but how does this part of it work, or why did they do that this way.
5-0 out of 5 stars The best PKI implementation guide
This is by far the best reference out there for understanding PKI in general and implementing Microsoft Windows Server 2003 CA infrastructure. Komar's depth of knowledge and breadth of experience clearly shows. Found the description of CAPolicy.INF files and sample files and scripts in this book extremely useful - that alone saved me a lot of time. And it doesn't end there...
Read more

Subjects:  1. Computer Books: Operating Systems    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Computer Security    6. Microcomputer Operating Environments    7. Microsoft Windows server    8. Operating Systems - Windows    9. Operating systems (Computers)    10. Security - General    11. Computers / General   


31. Linux Pocket Guide
by O'Reilly Media
Paperback (01 March, 2004)
list price: $9.95 -- our price: $9.95
(price subject to change: see help)
Isbn: 0596006284
Sales Rank: 8047
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (22)

4-0 out of 5 stars useful
not complete, but how could it be. i use this all the time to look up syntax.

5-0 out of 5 stars Great book for anybody working on Unix Env
This is the best pocket reference book that you can get. Its been really helpful to me in a lot of occasions when you just know that there is a command to do it but just cannot remember what the command is. Would definitely say a must to anybody starting or already working with Unix/Linux.

5-0 out of 5 stars Linux Companion
If you are new to Linux like me and would like to learn Linux in a week then this book is a must have along with "Linux for Dummies" by LeBlance.
Read more

Subjects:  1. Computer Books: General    2. Computer operating systems    3. Computers    4. Computers - Operating Systems    5. Linux    6. Linux (Computer software)    7. Operating Systems - Linux    8. Operating systems (Computers)    9. Computers / Operating Systems    10. Computers / Operating Systems / Linux    11. Unix, Unix Linux & Unix TCL/TK   


32. Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management (Core)
by Prentice Hall PTR
Hardcover (14 October, 2005)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 0131463071
Sales Rank: 11983
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (22)

5-0 out of 5 stars Another hit from the Core series! Awsome job!
This is an excellent book for all Security Practitioners. FromIdentity Managment to Mutli-factor athentication this book provides examples and clear description of many important concepts. The bookcovers enterprise patterns for access contol, federatation and identity management. Like the J2ee patterns, I see this book being an important/practical addition for the security community.
5-0 out of 5 stars A classic security book for java guys
I picked this book to read about using smartcard and biometrics in j2ee application. I am really amazed to see, this is the only book in the market to illustrate how to put together all three factors of authentication in a j2ee application. More compelling, the authors did a terrific job to cover every possible security option that adds value to j2ee application. The patterns and best practices for application security architecture and design strategies for the presentation tier, business tier, and Webservices tier of j2ee platform are very promising and helpful.
5-0 out of 5 stars Recommended for All Security Architects
I have found all the Sun "Core" Java books to be at cut above, but this one differs in that while obviously Java-centric, much of the patterns dicussed are relevant to all development platforms. I'd recommend this book to developers and architects of web services and web applications regardless of their preferred development environment. ... Read more

Subjects:  1. Architecture    2. Business Enterprise    3. Computer Books: Languages    4. Computer security    5. Computers    6. Computers - Languages / Programming    7. Java (Computer program language)    8. New Business Enterprises    9. Programming Languages - General    10. Programming Languages - Java    11. Security - General    12. Computers / Programming Languages / Java    13. Data security & data encryption    14. Network security   


33. Management of Information Security
by Course Technology
Paperback (January, 2004)
list price: $76.95 -- our price: $73.10
(price subject to change: see help)
Isbn: 0619215151
Sales Rank: 106857
Average Customer Review: 3.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (2)

2-0 out of 5 stars Boring, boring, boring
Did I tell you the book was boring?
4-0 out of 5 stars Philosophical (Textbook) exposition of InfoSec
If you're looking to get down into the nitty-gritty of infosec, for ways and methods of securing networks and systems, then this probably isn't the book you need. This is a textbook and so it overs a fairly high level viewpoint, even philosophical approach, to infosec. The granualarity just isn't there for the practising person to gain much from this in a substantive way.
Read more

Subjects:  1. Business / Economics / Finance    2. Computer Books: General    3. Computers    4. Information Management    5. Information Technology    6. Leadership    7. Management Information Systems    8. Security - General    9. Business information systems    10. Data security & data encryption    11. Management & management techniques   


34. Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses (2nd Edition) (Prentice Hall Series in Computer Networking and Distributed Systems)
by Prentice Hall PTR
Paperback (23 December, 2005)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0131481045
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

In defending your systems against intruders and other meddlers, a little knowledge can be used to make the bad guys--particularly the more casual among them--seek out softer targets. Read more

Reviews (33)

5-0 out of 5 stars Counter Hack this Book
Counter Hack
5-0 out of 5 stars highly recommended
I highly recommend Counter Hack Reloaded to anyone who wants to better understand the technical details of computer hacking / security / defense.
5-0 out of 5 stars When the best defense is a good offense
The second edition of Ed Skoudis and Tom Liston's COUNTER HACK RELOADEDreturns a primary system administrator's resource to new levels, continuing the attack on destructive hacks with a counter-hack guide which remains useful because over half the material in this edition has been revamped and updated to reflect the latest hacker techniques. Typical hacker methods and tools are surveyed, new 'anatomy of an attack' analyses are detailed, and even a new section on wireless hacking appears. COUNTER HACK RELOADED: A STEP-BY-STEP GUIDE TO COMPUTER ATTACKS AND EFFECTIVE DEFENSES is one of the best on the market - and a most for any network administrator facing tday's many security challenges. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Data Security    4. Computer networks    5. Computers    6. Data protection    7. Internet - Security    8. Networking - General    9. Security - General    10. Security measures    11. Computers / Internet / Security    12. Databases & data structures    13. Network security   


35. The CISSP Prep Guide: Gold Edition
by Wiley
Hardcover (31 October, 2002)
list price: $80.00 -- our price: $47.88
(price subject to change: see help)
Isbn: 047126802X
Sales Rank: 98579
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (23)

4-0 out of 5 stars Still enough to pass the CISSP
I sat for and passed the CISSP test in January 2006.I used the following resources to help in passing the CISSP:
5-0 out of 5 stars Excellent CISSP Book and CDROM - Highly Recommended.
Dear All, I recently completed my CISSP review studies, passed the exam, and completed the CISSP endorsement process. This is a very worth while endeavor and, as someone with many years of Internet security and risk management experience, I highly recommend the CISSP certification process for everyone.Reviewing the 10common bodies of knowledge (CBK) has value for everyone in the IT business and I am very pleased to have taken the time to review the material and complete the exam.For my self-study review, I purchased four books via Amazon: (1) The CISSP Pre Guide - Gold Edition by Ronald L. Krutz and Russell Dean Vines, (2) All-In-One CISSP Exam Guide, Third Edition by Shon Harris, (3) Official(ISC)2 Guide to the CISSP Exam by Susan Hansche, John Berti and Chris Hare, and (4) CISSP Certified Information Security Professional Training Guide by Roberta Bragg. Each of these texts came with a CDROM for practicing test questions on a Windows PC and covered the 10 CISSP CBKs. I found the first three CISSP books in my list to be helpful. Of those three, the most helpful was The CISSP Prep Guide- Gold Edition by Krutz and Vines. This book is concise, well written, and easy to read.The CDROM is excellent and nearly error free.The text is well thought out and informative. I also recommend Shon Harris' book, with reservation. I found it hard to get to the required CISSP information, at times, due to the attempts at humor in the book.The CDROM of sample test questions were also very good, albeit not as rich in features as the book by Krutz and Vines. The Official(ISC)2 Guide to the CISSP Examby Susan Hansche, John Berti and Chris Hare was a disappointment. This book read just like a cut-and-paste from the Internet and other documents; and the companion CDROM was full of errors and omissions.After a while I stopped using this text book and focused on the first two.I am sorry to say that CISSP Certified Information Security Professional Training Guide by Roberta Bragg was a complete disappointment from every perspective.The CDROM example tests were riddled with errors and omissions. For those interested in my self-study technique, I took each book and studied one (sometimes two) of each of the CBK chapters each day.Then, I repeated the same process for each of the other books, except for the book by Bragg, which was dropped for reasons mentioned. I took all the sample tests repeatedly, before and after and then again.I must have practiced between 4000-5000 sample questions.It was challenging and enjoyable.In summary, I highly recommend Krutz and Vines and also recommend, with reservation, the book by Shon Harris. No single book can cover the entire CBK of the CISSP. The more you study, the better.Best of luck on your CISSP studies. The CISSP is certainly an experience that will improve your knowledge of the field of IT security and benefit the profession at-large.

5-0 out of 5 stars Goes into details
This is a great book. Unlike many other CISSP books, the book goes into details of each topic. For example, chapter 2 of the books provide great details on the Kerberos Protocol, and describes it better that any other CISSP book. The description was so good that it reminded of university days, when we had to learn various algorithm/protocols inside-out. I would recommend this book to anyone. http://validate.sf.net ... Read more

Subjects:  1. Certification    2. Certification Guides - Cisco    3. Certification Guides - General    4. Computer Books: General    5. Computer Data Security    6. Computer networks    7. Computers    8. Computers - Certification    9. Electronic data processing per    10. Electronic data processing personnel    11. Examinations    12. Security - General    13. Study Guides    14. Computers / Security    15. Data security & data encryption    16. Network security    17. Social & Legal Aspects of Computing   


36. Writing Secure Code, Second Edition
by Microsoft Press
Paperback (04 December, 2002)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0735617228
Sales Rank: 169422
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (31)

5-0 out of 5 stars An eye opener
You think your data is safe, your website secured, your code foolproof.... think again. If you haven't read this book, probably none of the above are true. This book is written with a hacker's mind. It reveals and elaborates on the most common and not so common volnurabilities of computer and web applications. I am glad I read this book and used the information to plug the holes at a client's web application, so when one of their laptops was later compromised, no harm was done to their data or IT infrastructure.
4-0 out of 5 stars Good reference for Securing Microsoft Application Development.
I am happy with this book, it helped me quickly with all possible security options with Microsoft C++ and little bit of .NET framework. The book drills well enough on the Microsoft specific implementation guidelines for authentication, authorization, cryptographic options, database connectivity etc. It helps most part, but the book is weak on security options related to XML Web services particularly technologies related to WS-Security and Passport (Identity federation options).I am not a Microsoft developer so I do understand the security holes with every Microsoft application..(never heard of a Java virus), so I always wondered why the authors did'nt suggest to secure their own applications from redmond.If you are a C# developer, I am sure you will like it...and it certainly worth a buy.

5-0 out of 5 stars Required readind, not just at MS
Every professional developer should read this book, period!Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Languages / Programming    6. Data encryption (Computer scie    7. Data encryption (Computer science)    8. Programming - General    9. Security - General    10. Computers / General    11. Data security & data encryption    12. Software engineering   


37. Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Paperback (24 August, 2005)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 067232718X
Sales Rank: 22073
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (4)

4-0 out of 5 stars Well Leashed and Very Useful Installation Guide
The book is poorly named. "Unleashed" suggests to me wild and wonderful things to do with complex features or even tricks and undocumented things. This is definitely a black Labrador on-the-leash kind of book, and it will get an administrator safely across the broad avenue that is an ISA installation. It's a great book in spite of the name.
5-0 out of 5 stars Awesome Book
This is by far the best ISA Server book on the market.
5-0 out of 5 stars Great book on a rising product!
This is THE book if you are looking to learn ISA 2004. It is structured in an easy-to-understand manner for windows admins who are familiar with Windows but may not have been exposed to ISA Server or are upgrading from ISA 2000. All in all this is the only book on the subject you'll need. ... Read more

Subjects:  1. Client-Server Computing - General    2. Computer Books: General    3. Computers    4. Computers - General Information    5. Internet - General    6. Internet - Security    7. Security - General    8. Computers / Client-Server Computing    9. Data security & data encryption    10. Internet    11. Network security   


38. Corporate Computer and Network Security
by Prentice Hall
Hardcover (17 March, 2003)
list price: $132.40 -- our price: $132.40
(price subject to change: see help)
Isbn: 0130384712
Sales Rank: 206720
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars Excellent for Management level
I just finished reading this one and I found it to be very helpful for a person trying to find management level understanding of security, I have been working with networking and security for the last 10 years of my life and it has been very helpful to pinpoint several management aspects that technology savvy people (I prefer that over geek) usually don't follow or look at. I enjoyed the explanations, everything was very easy to read and understand, the introduction to cryptography is simply one of the best I have found out there. Again, if you are a technical guru looking for technical advice there is no much use to it in this book, OS, Networks and other practitioner level stuff are not well defined, simply mentioned for reference or examples. Another part I liked about it was the level of detail that the author had to reference the attacks and statistics, which a lot of us love to read and know about. Finally, make sure to get edition 5 of the book, I am referring to edition 4, I am sure that there is a lot to cover in a couple years regarding security and the way to go about it. I got the book from the university package so I wont be getting the new one, it's simply overpriced in my opinion.

2-0 out of 5 stars Network Security?
I purchased a copy of this book for a network security class.In a way it has been a great read, for humor.The terms and programs are dated at best, made up at worst.An example, 'drive-by hacking,'I have NEVER seen this anywhere.It is commonly refered to as 'war driving,' showing its lineage to 'war dialing' or 'Snooping'.I have worked in IT security for the past 3 years and I find this book insulting.But, for a plus, it is a convenent size to use as a clip board, and it does hold papers down on my desk well.

5-0 out of 5 stars Great book...
This is an excellent book -- really gives you a security mindset. Informative, yet still an easy read. The only think I didn't like is the price of the book -- but I bought it using a coupon from UnderTag.com, so it ended up being a bargain for me! ... Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Computer Security    6. Computers - General Information    7. Electronic data processing dep    8. Electronic data processing departments    9. Networking - General    10. Security - General    11. Security measures    12. Computers / Security    13. Data security & data encryption   


39. Stealing the Network: How to Own the Box
by Syngress Publishing
Paperback (01 April, 2003)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 1931836876
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Read more

Features

  • Illustrated

Reviews (31)

5-0 out of 5 stars Entertaining in it's own right...
The Stealing the Network series of books is in a catagory on it's own. Thrilling, entertaining, and fun to readjust scratches the surface of these books. I'll recommend this book to anybody, from joe sixpack who only uses the internet for games and pr0n to mitnick himself.
4-0 out of 5 stars Useful, readable illustration of computer security concepts
_Stealing the Network: How to Own the Box_ has 10 stories with a first person narrator, who is either an attacker, or in two cases, a defender.While the characterization isn't up to the standards of (good) commercial fiction* in most cases, it makes the technical medicine go down easier and gives a picture of who and why people do this stuff.That picture is useful in making an abstraction feel more like a concrete threat.
3-0 out of 5 stars Rough writing, but interesting
The writing needs some help -- I understand the newer books are edited by an actual writer to smooth out the prose a bit.
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer networks    4. Computer security    5. Computers    6. Computers - Communications / Networking    7. Internet - Security    8. Networking - General    9. Security measures    10. Computer hackers    11. Computers / Communications / Networking    12. Computers / Networking / General    13. Computers / Security    14. Cyberterrorism    15. Data security & data encryption    16. Security    17. Management Information Systems   


40. How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
by Addison-Wesley Professional
Paperback (02 February, 2006)
list price: $34.99 -- our price: $22.04
(price subject to change: see help)
Isbn: 0321369440
Sales Rank: 10239
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (7)

5-0 out of 5 stars Very informative. If you develop web software it's a must-read
I recently finished reading How to Break Web Software: Functional and Security Testing of Web Applications and Web Services by Mike Andrews and James A. Whittaker. I, like many of you, develop web software for a living. I've always taken security seriously and occasionally sneered when I ran across examples of common mistakes. Having said that, this book was an eye opener for me.
5-0 out of 5 stars Technique after technique that really works
You can't really read a book like this.You read a few pages and prop the book up with a cookbook holder and start typing in the examples.There were a couple I could not duplicate, but almost everything worked as the authors said it would. Great book, or maybe it would be better to say, great tool!
3-0 out of 5 stars Needs a good proofreader
This book is full of useful information couched in terms that even less technical
Read more

Subjects:  1. Computer Books: General    2. Computer Programs Testing    3. Computer networks    4. Computer software    5. Computers    6. Computers - General Information    7. Computers - Languages / Programming    8. Internet - World Wide Web    9. Programming - Quality Assurance & Testing    10. Programming - Systems Analysis & Design    11. Security - General    12. Security measures    13. Testing    14. World Wide Web    15. Computers / Security    16. World Wide Web (WWW)   


21-40 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top