BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Web Development - Security & Encryption

81-100 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$32.97
81. Configuring Check Point NGX VPN-1/Firewall-1
$900.00
82. Handbook of Information Security,
$34.64
83. The Tao of Network Security Monitoring:
$59.46
84. Digital Evidence and Computer
$18.15
85. Spies Among Us: How to Stop the
$34.64
86. Firewalls and Internet Security:
$57.00
87. Computer Forensics and Cyber Crime:
$32.99
88. Oracle9i RMAN Backup & Recovery
$31.47
89. Dr. Tom Shinder's Configuring
$26.39
90. Wi-Foo: The Secrets of Wireless
$65.00
91. Design, Testing, and Optimization
$23.07
92. Apache Security
$32.99
93. Computer Forensics : Incident
$32.99
94. Know Your Enemy: Learning about
$26.39
95. ASP.NET 2.0 MVP Hacks
$26.39
96. Citrix CCA MetaFrame Presentation
$38.49
97. Essential Check Point FireWall-1
$11.67
98. Secrets and Lies: Digital Security
$10.37
99. A Beginner's Guide To Day Trading
$26.39
100. 19 Deadly Sins of Software Security

81. Configuring Check Point NGX VPN-1/Firewall-1
by Syngress Publishing
Paperback (01 October, 2005)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 1597490318
Sales Rank: 38387
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (3)

5-0 out of 5 stars THE BULLETPROOF FIREWALL!!
Are you getting ready to take your Check Point certification exam? If you are, then this book is for you! Authors Robert Stephens, Barry Stiefel, Stephen Watkins, Simon Desmeules and Eli Faskha, have done an outstanding job of writing a book that is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product; as well as, those deploying VPN-1/FireWall-1 for the first time.
5-0 out of 5 stars All the new NGX features
Any familiar with prior versions of Check Point's firewall program and newcomers to CheckPoint alike will find CONFIGURING CHECK POINT NGX VPN-1/FIREWALL-1 an important overview of all the new features in NGX. From working with the SmartView Tracker tool and understanding how a Check Point VPN-1 Pro Gateway administrator evolves to work into network security to handling authentication and integrity issues globally, everything from building the platform to licensing is covered in detail. An excellent survey of all the enhanced features and changes.
4-0 out of 5 stars Good Reference Book
'Configuring Check Point NGX VPN-1/Firewall-1' by Robert Stephens is another good book by Syngress for IT Professionals.Syngress has really focussed on IT setup and configuration for it's latest releases of books and they have done a solid job.Packing over 600 pages of material into this guide, if you use Checkpoint at your job, you would be wise to pick up a copy of this book for your desk at work.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computers    4. Internet - Security    5. Security - General    6. Check Point, checkpoint, NGX, firewall, vpn, Route Based VPN, Directional VPN, Link Selection, Tunnel Management, Multiple Entry Points, Route Injection Mechanism, RIM, Wire Mode    7. Computer / Internet    8. Computers / Internet / Security    9. Computers / Networking / General    10. Computers/Security - General    11. Data security & data encryption   


82. Handbook of Information Security, 3-Volume Set (Handbook of Information Security)
by Wiley
Hardcover (30 December, 2005)
list price: $900.00 -- our price: $900.00
(price subject to change: see help)
Isbn: 0471648337
Sales Rank: 757349
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (1)

5-0 out of 5 stars Book Succeeds At Daunting Task
It would be a daunting task to put together a book to cover all areas of information security into a single, comprehensive reference work. Perhaps that is why it has not been done. Until now. On December 30, 2006, John Wiley and Sons will release the Handbook of Information Security (2005, Edited by Hossein Bidgoli et al, 3366 pages). With contributions from 240 contributors and extensive peer review by over 1,000 others, this book should be the definitive reference manual that sits in the office of every information technology auditor, as well as every information technology security professional who needs information without extensive digging. In fact this three volume set might easily replace many other security titles that have not been through as extensive a peer review process.
Read more

Subjects:  1. Computer Bks - General Information    2. Computer networks    3. Computers - Computer Security    4. Engineering - General    5. Home computer networks    6. Science/Mathematics    7. Security - General    8. Security measures    9. Strategic Planning    10. Technology    11. Business & Economics / Systems & Planning    12. Business & Management   


83. The Tao of Network Security Monitoring: Beyond Intrusion Detection
by Addison-Wesley Professional
Paperback (12 July, 2004)
list price: $54.99 -- our price: $34.64
(price subject to change: see help)
Isbn: 0321246772
Sales Rank: 48793
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (17)

5-0 out of 5 stars Great book to learn the Art of Network Monitoring!
I am not sure how I was first introduced to the author, Mr. Bejtlich.I cannot remember if I first noticed his work via his excellent blog or this, his first book.Either way, after reading "The Tao of Network Security" by Richard Bejtlich, I feel he has prepared and educated me in a way unlike any other author.The first item you must recognize is the tone that this book dictates right from the outset.The book begins by citing many different authors, their books and their value.I knew immediately that I was in for a treat.And I was right!
5-0 out of 5 stars Shows a disciplined approach to network security monitoring
A problem with the approach many people take to network and security monitoring is that they expect it to be plug and play.Install the software and then stop attackers in their tracks.If only it was so easy.But one can't simply install monitoring software or an IDS, collect data and expect it all to correlate and correct itself.
5-0 out of 5 stars One of a kind
This book has everyting as it pertains to network security monitoring. If you read this book from cover-to-cover, then you can consider yourself prepared to deal with anything that comes at you. This book presents material that would normally take years to learn in an easy-to-follow format. This book is a must have for anyone who is serious about their job and wants to make the jump to becoming an expert. ... Read more

Subjects:  1. Computer Bks - General Information    2. Computer Books: General    3. Computer Data Security    4. Computer Network Management    5. Computer networks    6. Computers    7. Computers - Computer Security    8. Security    9. Security - General    10. Security measures    11. Computers / Internet / Security    12. Network security   


84. Digital Evidence and Computer Crime, Second Edition
by Academic Press
Hardcover (08 March, 2004)
list price: $69.95 -- our price: $59.46
(price subject to change: see help)
Isbn: 0121631044
Sales Rank: 70258
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (10)

5-0 out of 5 stars Excellent book from a real expert
This is an excellent book from a real expert.5-0 out of 5 stars The book of digital crime
If you are new to this world this is where you should begin. Digital Evidence contains all the knowledge one could amass by obtaining PHD in computing. Especially when you don't have time for a Diploma. I have bought 5 books pertain to digital crime from USA and UK. But this is the one and only book I am recommending to any one in any continent who want to learn or new to this arena. All the other books in this field for Attorneys or with similar requirements are some what academic and may be boring.The CD-ROM accompanying the book gives you much needed hands on training, otherwise which will cost you at least US $ 4000, if you are to go to a training centre to do the same.

5-0 out of 5 stars Best computer forensic book available
Sometimes, defense attorneys have it easy: one slip-up by the prosecution and evidence is thrown out. Knowing that, law enforcement goes to great lengths to ensure that evidence is appropriately collected and protected. That works well in the physical world, where law enforcement has many generations' worth of experience. But in the modern world of computers and digital networks, where the simple act of rebooting a computer is enough to wipe out large amounts of evidence, law enforcement clearly needs thorough guidance. Read more

Subjects:  1. Computer Books: Internet General    2. Computer crimes    3. Computers    4. Computers - Computer Security    5. Evidence, Criminal    6. Forensic Science    7. Internet - Security    8. Networking - General    9. Security - General    10. Computer fraud & hacking    11. Medical / Forensic Medicine   


85. Spies Among Us: How to Stop the Spies, Terrorists, Hackers, and Criminals You Don't Even Know You Encounter Every Day
by Wiley
Hardcover (08 April, 2005)
list price: $27.50 -- our price: $18.15
(price subject to change: see help)
Isbn: 0764584685
Sales Rank: 52443
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

4-0 out of 5 stars Fun and enlightening read
Ira Winkler's "Spies Among Us" finally cleared my head on the subject of ... oooh, so horrible ... " cyberterrorism." Intuitively, when you read about "cyberterrorism" you instantly think "what a load of bull", but the amount of press and "research" that you see coming about it, makes one wonder. As a result, I was somewhat confused about the subject.Until now! Ira's book finally cleared it: at this stage, "cyberterrorism" is positively, absolutely, 100% "bull product." Here is why: computer failures are an accepted thing. "Everybody knows" that computers "are flaky", and might crash at any time, taking your work (or a billion-dollar Martian probe :-)) with them. Thus, computers do a pretty good job damaging themselves and things around them, and, thus, people will not be terrified if it happens due to malicious actions by whatever cyber-terrorists. Now, the above obviously doesn't cancel the use of computers and the Internet by the terrorists, but this is not what is commonly understood as "cyberterror."
5-0 out of 5 stars This Book Is Right On Target
In the first couple of chapters, I realize that this is not a novel of spy vs.spy, but an actual resource book that makes 100 % sense.
5-0 out of 5 stars Wake up managers!
Read this book to appreciate what is (or should be) keeping your Information Security Manager awake at nights, and to understand what he/she probably wants (or ought) to do about it.
Read more

Subjects:  1. Business intelligence    2. Computer Books: General    3. Computer crimes    4. Computers - Computer Security    5. Computers - General Information    6. Espionage    7. General    8. Leadership    9. Prevention    10. Security    11. Security - General    12. Self-Help    13. Terrorism    14. Computers / Security    15. Data security & data encryption   


86. Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
by Addison-Wesley Professional
Paperback (24 February, 2003)
list price: $54.99 -- our price: $34.64
(price subject to change: see help)
Isbn: 020163466X
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Essential information for anyone wanting to protect Internet-connected computers from unauthorized access. Includes: Read more

Reviews (21)

5-0 out of 5 stars What, you don't own this?
You should buy this book.Then you should read this book.

4-0 out of 5 stars A great overview, but a little thin on details.
This book is an excellent comprehensive introduction to computer security from policies to technologies.However, as pointed out by other reviewers, the depth of content when it comes to specifics is rather shallow, but one must take into account that to discuss each of these topics in depth would require volumes of text, and much of the specific information can easily be found in texts devoted specifically to those individual topics or from online sources.Given the breadth of information discussed, I think it strikes a very effective balance in displaying the information necessary to understand the basics of computer security.
5-0 out of 5 stars Good upgrade to a classic
This second edition has all the qualities the first edition had 10 years ago: Their writing is clear, they provide a sober assessment of the costs & benefits of various services (as opposed to other reviewers, I don't think the authors had much of an anti-Microsoft bias, just a realistic perspective on where Windows products are regarding security). The book is still fairly compact and it comes with an excellent biography and pointers to security software. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computer Data Security    4. Computer security    5. Computers    6. Firewalls (Computer security)    7. Internet - General    8. Networking - General    9. Security - General    10. Computer fraud & hacking    11. Computers / Internet / Security    12. Data security & data encryption    13. Internet    14. Network security    15. Privacy & data protection   


87. Computer Forensics and Cyber Crime: An Introduction
by Prentice Hall
Paperback (01 August, 2003)
list price: $57.00 -- our price: $57.00
(price subject to change: see help)
Isbn: 0130907588
Sales Rank: 269290
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

5-0 out of 5 stars Great undergraduate book
This particular book by Britz, is but one more example of her commitment to detail in all of her works.Like her previous books, this book is both readable and comprehensive.It is one that I myself have adopted in my computer crime course, and I am anxiously awaiting the second edition.The chapters on the legal issues and the history of computer crime are unparalleled in the extant literature.More succinctly, the greatest strength of the book is its' sheer readibility. Designed for undergraduates, this particular text is a must read for any beginner interested in computer crime and computer investigations.Unlike other books in the field which prove to be far too advanced for novices, Britz's book allows even the most unsophisticated reader to appreciate and understand the problems associated with the investigation of computer crime, as well as recognize emerging trends in this area.Please, please, provide a second edition as soon as possible!!

5-0 out of 5 stars Well Done
"Computer Forensics and Cyber Crime," written by Marjie T. Britz and, publish by Pearson Education Inc., seems to be a very well balance book, why? It just took me few minutes, between reading the introductory notes and "browsing" to its chapters, to understand that this book is well sequenced and organized.
2-0 out of 5 stars Sadly Dated
This would have been a superb book if it had been published in 2001 or so.Coverage is wide and quite detailed -- unfortunately, it appears the research for the book was done in 2000 (that's the publication date of the msot recent references in the bibliography)and a lot of things have changed since then.
Read more

Subjects:  1. Computer Books: General    2. Computer Crime    3. Computer crimes    4. Computer security    5. Computers    6. Criminology    7. Forensic Science    8. Legal Reference / Law Profession    9. Security - General    10. Crime & criminology    11. Social Science / Criminology   


88. Oracle9i RMAN Backup & Recovery
by McGraw-Hill Osborne Media
Paperback (18 October, 2002)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072226625
Sales Rank: 32229
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (13)

4-0 out of 5 stars The bible of RMAN
A full study about RMAN.
5-0 out of 5 stars Best book on market for RMAN and Backups
As a production DBA this is the best book so far since Velpuri wrote the original Oracle 8i backup and recovery book a decade ago. I like this a lot and together with the Oracle documentation, setting up and using RMAN is a snap compared to the pain it used to be to stumble with RMAN before. Throw away logical backups and hassle of SQL backups and use the power of RMAN. I was able to get cooking in a few hours with a good RMAN setup for our test and production database environments. Together with the Oracle 10g RAC book you have the complete knowledge to be a true HA Oracle DBA.

4-0 out of 5 stars GoodStuff, Piece of Art
I read this book when I was working on my OCP 9i track in 2004. At that time I needed more information about Backup and Recovery and especially Recovery Manager (RMAN)and I ended up borrowing this book from the library. I then put my exam study guide aside and finish this book. The book is really good. The part that I like the most is the book gives you scenarios that are easy to understand and it shows RMAN in different environment interacting with other storage media. I will definitely recommend this book. A book like this one does not come along very often. I am planning to buy my own copy soon. Great Job RG I give 4 stars. ... Read more

Subjects:  1. Computer Books: Database    2. Computers    3. Computers - Data Base Management    4. Database Management - General    5. Database Management - Oracle    6. Relational Databases    7. Computers / Database Management / General    8. Data security & data encryption    9. Oracle   


89. Dr. Tom Shinder's Configuring ISA Server 2004
by Syngress Publishing
Paperback (01 August, 2004)
list price: $49.95 -- our price: $31.47
(price subject to change: see help)
Isbn: 1931836191
Sales Rank: 25157
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (17)

4-0 out of 5 stars Definitive Guide for Beginners to ISA
I was totally new to ISA and came to know about this book from the ISAServer forum.
5-0 out of 5 stars The Best ISA 2004 Reference ever
Don't be fooled guys, even with the articles being available online you wont find such a complete explanation posted into the isa server's resource site. This guy writes ISA documentation for MS, so there you go, he is da man when it comes to the product and has been dealing with it since the beginning, ISA 2006 is still in RC and he already wrote a couple of articles regarding how to configure new features. Definitely, a must have if you are an ISA Admin or consultant looking for some information and advice to do the right setup for the given network.

4-0 out of 5 stars Too Much, Too Soon?
Since the early ISA Server 2000 days, author Tom Shinder has been the undisputed king of the ISA Server world. (Small world, isn't it.) His great expertise is complimented by a nice professional writing style that can be understood by any serious system administrator. If ISA is a big part of your responsibilities, you will want to have this book.
Read more

Subjects:  1. Client-Server Computing - General    2. Computer Books: Languages    3. Computer networks    4. Computer security    5. Computers    6. Computers - General Information    7. Firewalls (Computer security)    8. Internet - Web Site Design    9. Programming Languages - CGI, Javascript, Perl, VBScript    10. Security measures    11. Computer Programming    12. Computers / Client-Server Computing    13. Computers / General Information   


90. Wi-Foo: The Secrets of Wireless Hacking
by Addison-Wesley Professional
Paperback (28 June, 2004)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0321202171
Sales Rank: 28194
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (16)

5-0 out of 5 stars The secrets of Wireless Hacking
An excellent resource both for the novice as well as for the advanced user of WLAN. If you work professionally with wireless LAN you should own this book.

5-0 out of 5 stars Excellent book
I think everything that needed to be said has been said by Richard. This is an excellent book for those who want to get their hands dirty with Wireless Security. One of the areas in IT that will never die down, not anytime soon at least, is security. IT security is especially HOT right now, and a lot of companies are paying more attention to what they should have years ago. In my home city, Philadelphia, there is a project called Wireless for Philly that is supposed to bring wireless connection to everybody. Now, while people see that as just another development in this great city, I look at it as an opportunity for people who are smart enough to protect this kind of network. This book does the job. I am going to suggest that if you know you are not going to have time to dedicate to this book, don't pick this book up. You're better off! Because if you do pick this book up, it's going to be hard to put it down.

5-0 out of 5 stars *The* Source for Wireless Security Information
I was recently given the book Wi-Foo, The Secrets of Wireless Hacking as a present for my birthday, and I have been reading it extensively for the past few days. I have been involved with wireless security for a few years now, giving security talks to members of my community and helping out friends and family stay secure while enjoying the wonderful advantages of wireless computing. Over the past couple of years, I have slowly built up a small reference library of books related to wireless technologies and security. I even got involved in a small antenna building hobby which enabled me to better understand some of the ways RF works.
Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Computers - General Information    5. Security    6. Security - General    7. Computers / Internet / Security    8. Data security & data encryption    9. Network security   


91. Design, Testing, and Optimization of Trading Systems
by Wiley
Hardcover (12 August, 1992)
list price: $65.00 -- our price: $65.00
(price subject to change: see help)
Isbn: 0471554464
Sales Rank: 212580
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

2-0 out of 5 stars Boring
I agree in part with the reviewer that has given 1 star to this book. I have not finished this book yet, and in fact I bought this book because of the numerous 5 stars reviews.
1-0 out of 5 stars Worst Book I've Ever Read On The Topic
I have never written a comment about a book, but hopefully other people will at least be warned.This is the one of the worst books I've ever read.I have read several Wiley books; most of them are poorly written and lacking substance.This one is unbelievably bad.
5-0 out of 5 stars Concise
This book is the epitome of concise; I'm sure its the thinnest hardcover book I own. Don't be fooled; it is very dense and targeted. It does not tell you much about specific trading strategies; it is directed toward the person who has some trading ideas and wants to know how to test them thoroughly. I wish there were more books out there like this; expensive but worth every penny. ... Read more

Subjects:  1. Business / Economics / Finance    2. Business/Economics    3. Data processing    4. Futures    5. Futures And Options Trading    6. Investments & Securities - Futures    7. Options (Finance)    8. Applications of Computing    9. Business & Economics / Investments & Securities    10. Investment & securities   


92. Apache Security
by O'Reilly Media
Paperback (15 March, 2005)
list price: $34.95 -- our price: $23.07
(price subject to change: see help)
Isbn: 0596007248
Sales Rank: 17720
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (10)

5-0 out of 5 stars The single best Apache security book in print
I recently received copies of Apache Security (AS) by Ivan Ristic and Preventing Web Attacks with Apache (PWAWA) by Ryan Barnett.I read AS first, then PWAWA.Both are excellent books, but I expect potential readers want to know which is best for them.The following is a radical simplification, and I could honestly recommend readers buy either (or both) books.If you are more concerned with a methodical, comprehensive approach to securing Apache, choose AS.If you want more information on offensive aspects of Web security, choose PWAWA.
5-0 out of 5 stars Excellent book...
This book is worth every single dollar. The examples are very clear and also provide invaluable information about security.
5-0 out of 5 stars Review of "Apache Security" by Ivan Ristic
Excellent book.The chapters on PHP and logging are especially useful. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer Books: Internet General    4. Computers    5. Computers - General Information    6. General    7. Internet - Security    8. Internet - World Wide Web    9. Computer / Internet    10. Computer networks    11. Computer programs    12. Computers / Internet / Security    13. Network security    14. Security measures    15. Web servers    16. Web sites    17. apache ,apache security ,security ,hacking ,web applications ,database security ,application security ,web application security ,hardening apache ,apache lock down   


93. Computer Forensics : Incident Response Essentials
by Addison-Wesley Professional
Paperback (26 September, 2001)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0201707195
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Computer security is a crucial aspect of modern information management, and one of the latest buzzwords is Read more

Reviews (21)

5-0 out of 5 stars Great for general computer forensics information
Computer Forensics, Incident Response Essentials, is a great book for two groups of people:
4-0 out of 5 stars Good Introduction to Computer Forensics Investigations
This book is a couple years old now, but the fundamentals remain essentially the same. Kruse and Heiser are seasoned experts in computer forensics and incident response and they have managed to boil down years of knowledge and experience into a format that is easy to read and understand. While security experts may not learn anything new from this book, those entering the field will find it invaluable. It is comprehensive and detailed while remaining easy to read. The foundation provided by reading and understanding this book can be used to move forward into more technical areas. Computer Forensics is not fluff by any means though and could easily be kept nearby as a handy reference for a computer forensic investigation.
5-0 out of 5 stars Great book!
Very readable and interesting.
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computer security    4. Computers    5. Computers - Computer Security    6. Forensic sciences    7. Internet - Security    8. Networking - General    9. Security - General    10. Security measures    11. Computers / Internet / Security    12. Data capture & analysis   


94. Know Your Enemy: Learning about Security Threats (2nd Edition)
by Addison-Wesley Professional
Paperback (17 May, 2004)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0321166469
Sales Rank: 184508
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (28)

1-0 out of 5 stars One of the worst books I ever read
I have not much to say about this book -- all I have to say is that it's really crappy and pretty out-dated. The worst part I saw about it was IRC logs; over than 10 pages full of conversation logs among script kiddies!
5-0 out of 5 stars Eye Opener with practical knowledge to gain!
This book was written during what I call the "Age of Hacker Manuals".I'm happy to report that this isn't another copy and pasted book on exploits and vulnerabilities.This book goes deeper into analyzing attacks by creating Honeynets, purposely undefended networks for the sole purpose of intelligence gathering on the Blackhat community. This is a book for a true hacker, unlike many books that I have read.

5-0 out of 5 stars Excellent Overview
This is the definite resource book for Honeynet and Honeypot, and Intrusion Detection System in general. ... Read more

Subjects:  1. Computer Bks - Other Applications    2. Computer Books: General    3. Computer networks    4. Computer security    5. Computers    6. Computers - Computer Security    7. Miscellaneous Software    8. Security - General    9. Security measures    10. Computers / Internet / Security    11. Data security & data encryption   


95. ASP.NET 2.0 MVP Hacks
Paperback (30 May, 2006)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0764597663
Sales Rank: 24905
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

4-0 out of 5 stars Great Ideas for Advanced Sites
"ASP.NET 2.0 MVP Hacks and Tips" isn't really a reference guide or your standard tutorial manual.Rather, it's more like a cookbook - "here are some interesting things you can do in ASP.NET 2.0 and here's how to do them."
5-0 out of 5 stars Except for the Name, Very Valuable Stuff
I think there needs to be a new word invented. Hacks or hacking as used in this book title relates to hot shot, sophisticated, creative coding rather than in the bad sense of hacking into someone's system.
5-0 out of 5 stars Want to expand your development skills?
With the word 'Hacks' in the title, this may throw a few people a 'curve' ball, as it were. As explained inside the
Read more

Subjects:  1. Application software    2. Computer Books: Languages    3. Computer programs    4. Computers    5. Computers - Languages / Programming    6. Development    7. Internet - Application Development    8. Internet - Security    9. Microsoft .NET    10. Programming Languages - CGI, Javascript, Perl, VBScript    11. Programming Languages - SQL    12. Web site development    13. Computers / Programming Languages / CGI, JavaScript, Perl, VBScript    14. Internet   


96. Citrix CCA MetaFrame Presentation Server 3.0 and 4.0 (Exams 223/256) (Exam Cram)
Paperback (21 December, 2005)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0789732467
Sales Rank: 34945
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (1)

4-0 out of 5 stars Good Reference
I just passed the CCA 4.0 test using This book as my study guide. Other than a couple of glaring errors it was well written:
Read more

Subjects:  1. Certification Guides - General    2. Computer Data Security    3. Computers - Certification    4. Study Aids    5. Test Prep    6. Tests    7. Computers / Technical Skills    8. Operating systems & graphical user interfaces (GUIs)   


97. Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
by Addison-Wesley Professional
Paperback (21 January, 2004)
list price: $54.99 -- our price: $38.49
(price subject to change: see help)
Isbn: 0321180615
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

There are open-source firewalls, and there are commercial firewalls that are easier to configure. No software firewall, however, has the reputation for impermeability that Check Point FireWall-1 NG has. Read more

Reviews (7)

5-0 out of 5 stars The Best Check Point Book
If you must install or work with Check Point FW-1 NG, this book is a must have.I am a consultant working with a customer who was upgrading from 4.1 to NG.We had numerous small issues, many of which were not effectively addressed by CP support.The new Firewall was up and running flawlessly within a day of buying this book.Dameon ("Phoneboy") is the ultimate expert on all things Check Point, and he is an excellent communicator who has written a very easy to read book.This book will also stay close at hand as a reference anytime a FW-1 question comes up.I have to buy another copy, since the customer above refused to give it back after seeing how useful it was.

4-0 out of 5 stars Excellent Resource For Checkpoint Firewall-1 NG Admins
Each chapter of the book starts off with describing what the reader will learn or accomplish by reading that chapter. This sort of information is helpful for allowing readers to skip information that may not be useful to them and find the answers they seek. Many of the chapters also contain FAQ's and sample configurations and illustrations to help reinforce the information.
5-0 out of 5 stars Excellent!!!!!
There is a book called `the Best Damn Firewall Book Period'.But it is the wrong title, this is the Best Damn Firewall Book.
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer networks    4. Computer programs    5. Computer security    6. Computers    7. Computers - Computer Security    8. FireWall-1    9. Networking - General    10. Security - General    11. Security measures    12. Computers / Internet / Security    13. Network security   


98. Secrets and Lies: Digital Security in a Networked World
by Wiley
Paperback (30 January, 2004)
list price: $17.95 -- our price: $11.67
(price subject to change: see help)
Isbn: 0471453803
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Whom can you trust? Try Bruce Schneier, whose rare gift for common sensemakes his book Read more

Reviews (117)

5-0 out of 5 stars It's not a product, it's a process!
Bruce Schneier offers an excellent 'big picture' overview of the computer security field. From types of attacks, to algorithm security to security in the context of your data center, you get a full overview of the current practices and consequences arising from them. The author argues for security as a process, not a product; security is not something you can add to your product after the fact. Starting from the product specification, down to your last outsourced programmer, security has to permeate your organization for it to work. Building 'attack trees', relying on peer review and enforcing liability are all suggestions advanced by Bruce Schneier.
5-0 out of 5 stars One of the better books available on security
Secrets and Lies is one of the better books on computer security available today... from Bruce Schneier, the guy who literally wrote the book on cryptography: Applied Cryptography.
5-0 out of 5 stars Good Overview of Computer Security
This is a great book that goes beyond the math associated with many security books.The author gives us the "big picture" of security, making it entertaining, informative, and highly readable.He also balances security and privacy, pointing out the delicate balancing act between the two (and the difficulty of achieving both).Bruce knows the theory and math inside out (he leaves most of it out of this book).He writes very well, and gives plenty of real-world examples and analogies.I highly recommend this book.
Read more

Subjects:  1. Computer Books And Software    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Networking - General    7. Security - General    8. Security measures    9. Computers / Networking / General    10. Privacy & data protection   


99. A Beginner's Guide To Day Trading Online
by Adams Media Corporation
Paperback (01 March, 2000)
list price: $15.95 -- our price: $10.37
(price subject to change: see help)
Isbn: 1580622720
Sales Rank: 10001
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (76)

5-0 out of 5 stars A MUST READ FOR NEWBIES, BUT DON'T STOP THERE AS THERE IS A LOT MORE TO IT
Overall a good book for a beginner, the best thing about this book is that it walks you through the first steps of understanding markets and fundamentals with ease, it's was written in user friendly way, with simple terms and examples.
5-0 out of 5 stars A Classic
This book lives up to it's title in grand fashion. It is a delightful and eye-opening read for anyone interested in learning about daytrading and swing-trading stocks. The negative reviews have absolutely missed the point entirely. Of course a beginner is not going to read this book, open an account, and start trading profitably. She tells you that right in the book!
4-0 out of 5 stars Good introduction to daytrading
Good book for the beginner to get his feet wet in the merky waters of daytrading. Good explanation of support and resistence which are critical concepts and used by the most successful daytraders. Helps you to think deeply about yourself and trading which is a unique feature of her books. value for money. ... Read more

Subjects:  1. Business / Economics / Finance    2. Business/Economics    3. Day trading (Securities)    4. Electronic trading of securiti    5. Electronic trading of securities    6. Investments & Securities - General    7. Internet    8. Investment & securities   


100. 19 Deadly Sins of Software Security (Security One-off)
by McGraw-Hill Osborne Media
Paperback (26 July, 2005)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0072260858
Sales Rank: 29804
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (7)

5-0 out of 5 stars The bug parade
If you are serious about eradicating software security bugs, you should buy this book.Keeping an eagel eye on the bug parade is a critical activity in software security.(Just don't forget about design flaws while you're at it.)
5-0 out of 5 stars Required reading for software developers
If George Santayana were to recommend a security book, it would certainly be 19 Deadly Sins of Software Security. Santayana is the poet-philosopher widely known for saying, "Those who cannot remember the past are condemned to repeat it." For far too long, software developers have been making the same mistakes in programming as if they were incapable of remembering their past errors.
5-0 out of 5 stars A Must Have in your Info Security Library
Too often, software security is overlooked in the info security infrastructure of most organizations as we focus on network, computer, data, and physical security.That is a luxury organizations can no longer afford.The book gives a great overview of software security issues yet at the same time provides granular examples and solutions that can be readily implemented.Would serve as a great source for training of programmers in code security. ... Read more

Subjects:  1. Computer Books: General    2. Computer security    3. Computer software    4. Computers    5. Computers - Computer Security    6. Computers - General Information    7. Data encryption (Computer science)    8. Development    9. Programming - Software Development    10. Security    11. Security - General    12. Computer Programming    13. Computers / Security    14. Data security & data encryption    15. Network security   


81-100 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top