BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Web Development - Security & Encryption

121-140 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$29.67
121. Nagios: System and Network Monitoring
$26.39
122. CISSP for Dummies
123. The Undergroundtrader.com Guide
$37.79
124. MCSA/MCSE Self-Paced Training
$26.37
125. SSH, the Secure Shell: The Definitive
$50.37
126. CCIE Security Exam Certification
$62.51
127. CCS Coding Exam Review 2006: The
$29.67
128. Security Warrior
$35.99
129. Exploiting Software: How to Break
$32.97
130. Stealing the Network: How to Own
$16.49
131. Hacking for Dummies
$26.37
132. Hacker Disassembling Uncovered
$34.64
133. Windows Forensics and Incident
$17.00
134. How to Build a Multi-Level Money
$49.99
135. Microsoft Windows Security Resource
$32.97
136. Essential SNMP, Second Edition
$102.00
137. AAA and Network Security for Mobile
$39.42
138. Network Security Essentials: Applications
$29.69
139. The .NET Developer's Guide to
$23.07
140. Options Trading for the Conservative

121. Nagios: System and Network Monitoring
by No Starch Press
Paperback (30 May, 2006)
list price: $44.95 -- our price: $29.67
(price subject to change: see help)
Isbn: 1593270704
Sales Rank: 11382
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (2)

4-0 out of 5 stars Best for Nagios admins who want specific details on plug-ins
I recently received review copies of Pro Nagios 2.0 (PN2) by James Turnbull and Nagios: System and Network Monitoring (NSANM) by Wolfgang Barth.I read PN2 first, then NSANM.Both are excellent books, but I expect potential readers want to know which is best for them.The following is a radical simplification, and I could honestly recommend readers buy either (or both) books.If you are completely new to Nagios and want a very well-organized introduction, I recommend PN2.If you are somewhat familiar with Nagios and want detailed descriptions of a wide variety of Nagios plug-ins, I recommend NSANM.
4-0 out of 5 stars A nice solid Nagios introduction a la No Starch Press
Bookspecs:
Read more

Subjects:  1. Automation    2. Computer Books: General    3. Computer networks    4. Computers    5. Computers - Communications / Networking    6. Management    7. Networking - General    8. Networking - Local Area Networks (LANs)    9. Security - General    10. Computer Communications & Networking    11. Computers / Communications / Networking    12. Computers / Networking / General    13. Computers / Networking / Local Area Networks (LANs)    14. Nagios, system monitoring, network monitoring, network, unix, Linux, SMTP, POP3, HTTP, NNTP, PING, processor load, disk usage, memory usage, log files   


122. CISSP for Dummies
by For Dummies
Paperback (11 September, 2002)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0764516701
Sales Rank: 20973
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (15)

3-0 out of 5 stars A good first read, but you risk a false sense of security
I just recieved word last week I passed my CISSP exam, and I used this book among others to study for it.Let me give you a little background: I've been in IT for 10 years, starting as phone support, and moved on to desktop support, LAN administration, Exchange administrator, and eventually became my company's ISSO, then moved on to become an Information Assurance (Security) Engineer on one of our larger programs.Consequently, I had real world experience in many of the domains already.
3-0 out of 5 stars Nothing is wrong with the book - just not enough
I sat for and passed the CISSP test in January 2006.I used the following resources to help in passing the CISSP:
3-0 out of 5 stars CISSP for Dummies - Preparing for the Exam
This book is a good resource for keeping yourself focused when preparing for the exam. The chapters are not "in depth reviews" of the 10 Domains, but they do a good job of keep your mind in the study mode. I did like the accompanying CD which contains a series of questions and answers that can be read on a PDA. These were also helpful to stay focused. I would not recommend this book as the sole source for anyone preparing for the exam. For that you should consider the Official (ISC2) Guide or the Shon Harris All-In-One book. ... Read more

Subjects:  1. Certification    2. Certification Guides - General    3. Computer Books: General    4. Computer Data Security    5. Computer networks    6. Computers    7. Computers - Certification    8. Data Transmission Standards And Protocols    9. Data processing    10. Electronic data processing per    11. Electronic data processing personnel    12. Examinations    13. Networking - Network Protocols    14. Professional - General    15. Security - General    16. Study guides    17. Computers / Technical Skills    18. Data security & data encryption    19. Privacy & data protection   


123. The Undergroundtrader.com Guide to Electronic Trading: Day Trading Techniques of a Master Guerrilla Trader
by McGraw-Hill Trade
Hardcover (26 July, 2000)
list price: $39.95
Isbn: 0071360166
Sales Rank: 330223
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (37)

1-0 out of 5 stars totally worthless
It always amazes me how some people have the ability to write a whole book with nothing to say. If you can make money using the techniques in this book please email me, as far as I'm concerned this book is only meant to promote their services. The second half of the book is surely meant to impress, not to teach. I hate these selling techniques: they even make us pay for their promotional material.

5-0 out of 5 stars Pragmatic advise to those who can listen.
If one were to follow the advise in this book, they would be successful.The author leaves nothing to chance and is trying to teach the reader that he too must leave nothing to the whim of the market.The premise on which this excellent book is founded is to react to the market and not forecast it.As Jea Yu points out, it is harder to do than you might expect. The battleground is really the "baggage" that we all bring to the table - our ego's, our budget and most of all our bad judgment.This is a great book and teaches a winning style, if the trader has the discipline to follow it.

5-0 out of 5 stars Outstanding. Read it again and again.
A novice should probably read that fluffy Toni Turner book to get an idea of the lingo, but no one should contemplate day trading without reading Lu. This book is a detailed description of the intricacies of no-nonsense, hardcore daytrading, written by a consistently successful practitioner. Read more

Subjects:  1. Accounting - General    2. Business & Economics    3. Business / Economics / Finance    4. Business/Economics    5. Computer Networks    6. E-Commerce - General    7. Electronic trading of securiti    8. Electronic trading of securities    9. Futures And Options Trading    10. Investments & Securities - General    11. Domestic trade & commerce    12. Internet    13. Investment & securities   


124. MCSA/MCSE Self-Paced Training Kit (Exam 70-299): Implementing and Administering Security in a Microsoft Windows Server 2003 Network (Pro-Certification)
by Microsoft Press
Hardcover (21 April, 2004)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 073562061X
Sales Rank: 36175
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (9)

5-0 out of 5 stars A must...
I haven't read this yet. I'm still going through the XP book, but if this one is even close, this book is a must. An easy read and well laid out. The accompanying CDs are very beneficial also.
4-0 out of 5 stars Excellent guide
Any book from Tony is probably going to be good. This book is no exception. It is very well written and organized. It covers all aspects of Windows Server 2003 security. It is not quite comprehensive as you'll need the earlier 2003 Server books (or know those topics well enough) to fully cover the test. It includes good chapter summaries and practice labs. This book will also be useful to you as a reference after you have passed the exam.

5-0 out of 5 stars Best study guide I've read yet
This book is an excellent resource and preparation for the 70-299 exam. I've read through a lot of exam books over the years and this is the one that prepared me the best. Upon finishing this book, you feel as though you really understand the material, rather than feeling that you still have holes in your understanding, as you often do with other books. This book is comprehensive, well-laid out, and has a lot of good practice questions in the book and on CD. Microsoft Training Kit CDs are often quite meaty, and this is no exception. I highly recommend this book. ... Read more

Subjects:  1. Certification    2. Certification Guides - General    3. Certification Guides - Msce    4. Client-Server Computing - General    5. Computer Books And Software    6. Computers    7. Computers - Certification    8. Data Processing - General    9. Electronic Data Processing    10. Electronic data processing per    11. Electronic data processing personnel    12. Examinations    13. Microsoft software    14. Programming - Software Development    15. Security - General    16. Software Engineering    17. Study guides    18. Computer Communications & Networking    19. Computers / General    20. Computing and Information Technology    21. Home Computing    22. Microsoft Windows   


125. SSH, the Secure Shell: The Definitive Guide
by O'Reilly Media
Paperback (01 January, 2005)
list price: $39.95 -- our price: $26.37
(price subject to change: see help)
Isbn: 0596008953
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

The suite of utility applications that Unix users and administrators find indispensable--Telnet, rlogin, FTP, and the rest--can in fact prove to be the undoing of interconnected systems. The Secure Shell, a.k.a. SSH (which isn't a true shell at all) provides your otherwise attack-prone utilities with the protection they need. Read more

Features

  • Illustrated

Reviews (27)

1-0 out of 5 stars Stick to the man page
This is one of those O'Reilly books that actually makes you stupider than you were before having read it.
5-0 out of 5 stars Makes sense of the obscure land of SSH
For something that should be simple SSH is anything but a walk in the park. This is compounded by the fact that the documentation for SSH just blows. This book, however, does everything but blow. In classic O'Reilly fashion the author decomposes the topic and covers it effectively from almost every angle with excellent writing and superb graphics. This is a great book for anyone who uses SSH, or who is having issues with it.

4-0 out of 5 stars why you should use ssh
[A review of the 2nd EDITION 2005.]
Read more

Subjects:  1. Computer Books: General    2. Computer networks    3. Computers    4. Computers - Computer Security    5. Computers - General Information    6. Data encryption (Computer science)    7. Networking - General    8. Networking - Intranets & Extranets    9. Networking - Network Protocols    10. Security - General    11. Security measures    12. Computers / Computer Security    13. Computers / Security    14. Computers/Networking - General    15. Data security & data encryption    16. Network security    17. SSH, secure shell, security, encryption,   


126. CCIE Security Exam Certification Guide (CCIE Self-Study) (2nd Edition) (Ccie Self-Study)
by Cisco Press
Hardcover (11 May, 2005)
list price: $79.95 -- our price: $50.37
(price subject to change: see help)
Isbn: 1587201356
Sales Rank: 215439
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (74)

3-0 out of 5 stars A good global view to exam
It's a good book with most of all topics to someone make the CCIE Security written exam, but not so deep.

2-0 out of 5 stars Puddle depth? That's one way of putting it...
As another reviewer put it: puddle depth. As is not uncommon with most CCxx prep books, Benjamin's CCIE Security coverage is barely broad enough and nowhere deep enough. I'm using this more as a basic overview for a topic, then it's off to the Cisco documentation and lab work for a few hours to figure out how the thing really works.
5-0 out of 5 stars Excellent Study Guide for CCIE Security Written Exam
I obtained a copy of Henry Benjamin's "CCIE Security Exam Certification Guide" (ISBN 1587201356) to complete my final preparation for the CCIE Security Written Exam. Contrary to a few other reviews, I found this book to be extremely valuable for my final review. This book is exactly what it states in the title, a study guide for the exam. It is not a detailed analysis of security architectures and principles. It should not be viewed a CCIE Security "bible". Rather, this book should be used by a CCIE Security candidate only after he or she has read most of the other security related books listed on the CCIE Written Roadmap on Cisco's website.
Read more

Subjects:  1. Certification    2. Certification Guides - Cisco    3. Certification Guides - General    4. Computer Books: General    5. Computer Data Security    6. Computer networks    7. Computers    8. Computers - Certification    9. Data Transmission Standards And Protocols    10. Electronic data processing personnel    11. Examinations    12. Networking - Internetworking    13. Networking - Network Protocols    14. Networking - Security    15. Security - General    16. Security measures    17. Study guides    18. Computers / Technical Skills    19. Computing and Information Technology    20. Network security   


127. CCS Coding Exam Review 2006: The Certification Step (CCS Coding Exam Review: The Certification Step (W/CD))
by Saunders
Paperback (19 January, 2006)
list price: $67.95 -- our price: $62.51
(price subject to change: see help)
Isbn: 1416024832
Sales Rank: 138989
US | Canada | United Kingdom | Germany | France | Japan

Subjects:  1. Certification Guides - Cisco    2. Computers - Certification    3. Medical    4. Medical History & Records    5. Networking - Security    6. Medical / Medical History & Records   


128. Security Warrior
by O'Reilly Media
Paperback (01 February, 2004)
list price: $44.95 -- our price: $29.67
(price subject to change: see help)
Isbn: 0596005458
Sales Rank: 55918
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (26)

5-0 out of 5 stars Essential read for any web-based application developer
This book is outstanding and an essential read for anyone doing web-based application development.
5-0 out of 5 stars Good Overall Coverage and Plenty Technical Details
Security Warrior has good overall coverage and plenty technical details for people like me who are interested in the technical details.

2-0 out of 5 stars Weak Information
This book should be titled "General Security Buzzwords 101 For The High Level User." The information in it just misses the information that one would be looking for in a technical environment. ... Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computers    4. Computers - Languages / Programming    5. Programming Languages - General    6. Security - General    7. Computers / Languages / Programming    8. Computers / Programming Languages / General    9. Computers / Security    10. Computers/Security - General    11. Data security & data encryption    12. Network security    13. Security, Security Warrior, Reverse Engineering, computer virus, worm, DOS, denial of service, Cyrus Peikari, Anton Chuvakin, Network Administration   


129. Exploiting Software: How to Break Code
by Addison-Wesley Professional
Paperback (17 February, 2004)
list price: $49.99 -- our price: $35.99
(price subject to change: see help)
Isbn: 0201786958
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Read more

Reviews (26)

5-0 out of 5 stars Want to fix things instead of break them?
One of the authors here.
4-0 out of 5 stars Why we use it for a graduate class
The one major strength of this book, from a computer science viewpoint, is its emphasis on "attack patterns".This systemization of these issues really differentiates this book from many of its competitors (which tend to be either the latest 500 hacks or descriptions of standards).Put simply CS is the study of algorithms, and this book fits nicely into that tradition.

5-0 out of 5 stars great book
I am a relative novice to programming and exploitation however this book was truly a mind exciting experience. I found all of it's content to be useful, although I would say that this text is definately for an advanced user or someone quite motivated to understand the ideas presented as it delves into quite a bit of detail demanding advanced knowledge of several languages. Although there is a lot of info in this book, I would say that if you do not already know how to exploit a system in a basic form, you will be lost immediately as a step by step proceedure is not given but assumed to be known. ... Read more

Subjects:  1. Computer Bks - General Information    2. Computer Books: General    3. Computer Data Security    4. Computer Programs Testing    5. Computer hackers    6. Computer security    7. Computer software    8. Computers    9. Computers - Computer Security    10. Networking - General    11. Programming - Systems Analysis & Design    12. Security - General    13. Testing    14. Computers / Internet / Security    15. Software engineering   


130. Stealing the Network: How to Own a Continent
by Syngress Publishing
Paperback (May, 2004)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 1931836051
Sales Rank: 74438
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (22)

5-0 out of 5 stars Fun, Fun, Fun
I read a lot of technical books and also a lot of spy books.This mashed both of my favorite types of books. The authors who are hackers themselves did a great job of creating a story.I would recommend, and have recommended this book to a lot of people.
4-0 out of 5 stars Fun, Entertaining...
but the writing certainly isn't the best.They're a bunch of computer geeks writing about what they know best, and they make it entertaining as heck.I'd recommend it to anyone who enjoys computers.

4-0 out of 5 stars How do you make a how-to-hack book into a compelling read?
Well, you can make a novel out of it.
Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Computer Security    4. Networking - General    5. Security - General    6. Computer Communications & Networking    7. Computer hackers    8. Computer security    9. Computers / Computer Security    10. Computers / Security    11. Cyberterrorism   


131. Hacking for Dummies
by For Dummies
Paperback (30 April, 2004)
list price: $24.99 -- our price: $16.49
(price subject to change: see help)
Isbn: 076455784X
Sales Rank: 34576
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (13)

5-0 out of 5 stars Great easy-to-understand quick references
This is a great, easy to read and use reference for both non-technical business leaders as well as IT professionals.It is also a great resource for home computer users, and small- to medium-sized businesses who often do not have the resources to hire dedicated security staff.The book covers the entire spectrum of ways in which computer systems can be compromised and attacked, an easy-to-understand description of how the exploits are executed, and, usually lacking in other reference books on this topic, step-by-step instructions for not only how to identify when the hacks occur, but also how to defend against them.Kevin Beaver also includes some very important warnings you need to keep in mind when performing your own vulnerability and hacking tests against your own network and systems to discover your own technical weaknesses.

5-0 out of 5 stars GREAT FOR THE UNEXPERIENCED
This book is great for beginners, it talks about the ethical hacker and penetration tests. However it also gives out information that can be used for blackhat hacking. It walks you through a tutorialstep by step, and gives out names of some other books that can be helpful. If you have no or little experience this book is for you.

5-0 out of 5 stars Real world information for Network Security
Hacking for Dummies sets a foundation for ethical hacking and should be used as more than the proverbial "how to". When reading the pages, try to realize that you are not just learning true methods of attack; you are also gaining valuable information for prevention.
Read more

Subjects:  1. Computer Books: General    2. Computer hackers    3. Computer networks    4. Computer security    5. Computers    6. Computers - Computer Security    7. Security - General    8. Security measures    9. Computers / Security    10. Data security & data encryption   


132. Hacker Disassembling Uncovered (Uncovered series)
by A-List Publishing
Paperback (01 April, 2003)
list price: $39.95 -- our price: $26.37
(price subject to change: see help)
Isbn: 1931769222
Sales Rank: 44321
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (17)

5-0 out of 5 stars Delivers what others promise
This has the most straightforward exposition of exploits.
5-0 out of 5 stars Excellent book, highly recommended!
This book is fantastic- one of a kind, by far :)
3-0 out of 5 stars fair intro to disassembly
I give the author credit for a decent intro to disassembly, but it's a difficult path with this book. Expensive tools are assumed to be available (no reference is made to free alternatives), and less than subtle remarks about using these tools to make commercial software "free".
Read more

Subjects:  1. Computer Books: General    2. Computer Programs Debugging    3. Computer programming    4. Computer security    5. Computers    6. Computers - Computer Security    7. Debugging in computer science    8. Programming - General    9. Programming - Systems Analysis & Design    10. Security - General    11. Computer fraud & hacking    12. Computers / Security    13. Data security & data encryption   


133. Windows Forensics and Incident Recovery
by Addison-Wesley Professional
Paperback (21 July, 2004)
list price: $54.99 -- our price: $34.64
(price subject to change: see help)
Isbn: 0321200985
Sales Rank: 35425
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Invaluable Resource For Any Windows Admin
About a year ago I was investigating a system to try and determine if it was attacked, as well as when and how if it had been. I wrote for help to a list that I am on and Harlan Carvey responded with detailed and useful information that helped me out.
5-0 out of 5 stars An Excellent and Informative Book
I am a nuts and bolts kind of guy and this book suits me to a tee. Harlan covers the topics thoroughly and has added to my knowledge of forensic methodology and shown me new techniques to discover information the many recent versions of the Windows operating system. He has done his homework, mixed it up with lots of coding examples, and even added some dream weaving to illustrate his points.
5-0 out of 5 stars Invaluable Reference for Todays Windows Admins
I would strongly recommend this book to anyone that is looking at Windows incident response or Windows monitoring.This is the first computer book that I have read cover to cover in well over 5 years and I have bought a lot of computer books.From the beginning until the end you are bombarded with information that is useful and relevant to today's Windows management.Not only are you told about different tools but are shown how they are used and what benefit they have, not only in incident response but also in daily monitoring.
Read more

Subjects:  1. Backup processing alternatives    2. Computer Books: General    3. Computer Data Security    4. Computers    5. Computers - Computer Security    6. Data recovery (Computer scienc    7. Data recovery (Computer science)    8. Electronic data processing    9. Microcomputer Operating Environments    10. Security    11. Security - General    12. Computers / Internet / Security    13. Data security & data encryption    14. Microsoft Windows    15. Network security   


134. How to Build a Multi-Level Money Machine
by Prime Concepts Group Inc
Paperback (December, 2001)
list price: $17.00 -- our price: $17.00
(price subject to change: see help)
Isbn: 0967316464
Sales Rank: 42804
Average Customer Review: 3.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

5-0 out of 5 stars Randy Gage in one word is AMAZING
I would encourage anyone thinking about building a business to read this book.I had never been involved in a MLN company before and when I joined Agel I read this book cover to cover and can tell you it literally jump started my business.He is AMAZING!

1-0 out of 5 stars Save yourMoney
This book contains almost nothing you wouldn't get from any decent Multi-level Marketing company. He does however spend a great deal of time hyping his other books and tapes. If you are interested in starting a MLM company yourself his advise consists of get a lawyer. Rated 1 star because you can't rate it 0.

5-0 out of 5 stars An Excellent MLM Trainer
Randy is one of the strongest advocates of a system's approach to building an MLM organization and an excellent MLM Trainer. I've attended his seminars and training both in Singapore and in USA during the last 3 years and I find that his teachings timeless!
Read more

Subjects:  1. Business & Economics    2. Business & Economics / Marketing / Multilevel    3. Business/Economics    4. Entrepreneurship    5. Investments & Securities - General    6. Marketing - Multilevel    7. Multilevel marketing    8. Network Marketing   


135. Microsoft Windows Security Resource Kit
by Microsoft Press
Paperback (12 March, 2003)
list price: $49.99 -- our price: $49.99
(price subject to change: see help)
Isbn: 0735618682
Sales Rank: 13311
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (10)

3-0 out of 5 stars A reluctant 3 stars (2 1/2 perhaps more appropriate)
I used the book as a reference for MCSE.But, now that I'm really going through and reading it more thoroughly I'm surprised that it was rated 5 stars at the time I bought and still is.
5-0 out of 5 stars Very helpful
If you are going to do anything w/ MSFT security in XP, 2000 or NT, you must use this book, there is a lot of helpful info in it.

3-0 out of 5 stars An overly wordy reference with lots of hidden gems
I've read nearly a dozen security related books now, including a lot from the Hacking Exposed team.This doesn't compare.There's no flare, there's no personality, it's a reference text.

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Computer Security    7. Microsoft Windows (Computer fi    8. Microsoft Windows (Computer file)    9. Microsoft Windows (Computer pr    10. Networking - General    11. Security    12. Security - General    13. Computers / Operating Systems / Windows    14. Data security & data encryption   


136. Essential SNMP, Second Edition
by O'Reilly Media
Paperback (21 September, 2005)
list price: $49.95 -- our price: $32.97
(price subject to change: see help)
Isbn: 0596008406
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Without Simple Network Management Protocol (SNMP), networkadministrators might have to actually get out of their chairs and gosee what's up with all of the network-connected equipment under theirauthority. Perish the thought. Read more

Features

  • Illustrated

Reviews (2)

4-0 out of 5 stars Good SNMP coverage, but I needed a little more help
Essential SNMP, 2nd Ed (ES2E) fills a gap in being a modern book about an important management protocol.SNMP is used extensively by network management stations (NMS) like Nagios, which is now the subject of two independent books.E2SE does a good job covering SNMP issues important to administrators and NMS users.However, the book's organization and subject matter could be improved in the 3rd edition.
5-0 out of 5 stars A MUST HAVE!!
Are you a system or network administrator who could benefit from using SNMP to manage your equipment, but have little or no experience with SNMP or SNMP applications? If you are, this book is for you. Authors Douglas Mauro and Kevin Schmidt, have written an outstanding 2nd edition of a book that demystifies SNMP and makes it more accessible to a wider range of users.
Read more

Subjects:  1. Computer Books: Languages    2. Computers    3. Computers - Communications / Networking    4. Networking - Intranets & Extranets    5. Networking - Network Protocols    6. Programming Languages - HTML    7. Security - General    8. Computer networks    9. Computers / Communications / Networking    10. Computers / Internet / Intranets    11. Computers / Networking / General    12. Computers/Networking - Network Protocols    13. Computers/Security - General    14. Management    15. Management information systems    16. Networking standards & protocols    17. SNMP, Network Administration, System Administration    18. Simple Network Management Protocol (Computer   


137. AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
by John Wiley & Sons
Hardcover (28 October, 2005)
list price: $120.00 -- our price: $102.00
(price subject to change: see help)
Isbn: 0470011947
Sales Rank: 46982
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (2)

5-0 out of 5 stars Expensive, but worth it.
If you're looking for an in depth book on AAA and it's associated algorithms, there's no match for this book.Much as I wish I was wrong and that I could replace the book I borrowed from my friend with a cheaper book, I'm afraid I'm about to be forced to shell out the [...] on AAA.And I'm only going to need it as an intermittent reference.There's no math (at least no Greek), but many of the algorithms used to underpin the subject are explained concisely and clearly.It's simply well written and more informative than anything else on the market.I'm a sales engineer and this book was written on the ideal level for me.Technical enough but also abstract enough.Good work sir!

5-0 out of 5 stars Keeping Wireless Communications Secure
This 'Triple A' set stands for Authentication, Authorization, Accounting, and the theme of this book is maintaining security in a wireless cell-phone network.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computers    4. Internet - Security    5. Mobile computing    6. Networking - Security    7. Security - General    8. Security measures    9. Wireless Internet    10. Network security    11. Networking standards & protocols    12. Technology / Telecommunications    13. Telephone technology   


138. Network Security Essentials: Applications and Standards (3rd Edition)
by Prentice Hall
Paperback (19 July, 2006)
list price: $54.00 -- our price: $39.42
(price subject to change: see help)
Isbn: 0132380331
Sales Rank: 16563
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

3-0 out of 5 stars Hard to believe this book is by Stallings
I had to use this book for my Network Security class at grad level. Bits and pieces here and there do not help anyone who wants to learn the details of NW Security; but this book is what it is. I have used several Stallings' books and they are, at least in most cases, detail oriented and some of the best in the market. It is even harder for me to comprehend that Cryptography and NW Security Management are covered in the book in just 21 pages and 11 pages consecutively (but divided by other names later in the book with no tangible useage). See, if you want to learn Network Security, especially if you are employed in the area, I don't think you would appreciate just 21 pages of coverage of Cryptography. Not getting anything new in a chapter like that would be just too lame for you. Yes, the book refers to Applications and Standards in the subtitle but without implementation techniques and not a string of code that you usually find in your professional magazine subscription (from a programmer's perspective).
5-0 out of 5 stars For folks serious about learning network security
I purchased this book as part of the required reading for an Information Security class at UCLA.From the start the book was full of very technical and detailed information.Having little practical network experience, my first reading focused on grasping the low-hanging fruit. As I read the book a second and third time I picked up some serious knowledge.It seemed like everytime I re-read a chapter there was more there to glean.I'm now studying for the CISSP and CISA.My initial cold self-assessments returned scores in the 80%-100% range.That's without CISSP/CISA-specific studying. I attribute most of that knowledge to this book. This was money well spent!

4-0 out of 5 stars Quick & Dirty
This book appears to be a shorter, more concise version of Stallings' "Cryptography and Network Security: Principles and Practice." It has a much shorter, and therefore less complete treatment of security concepts in general and specifically cryptography.It might be good for a focused introductory course on network-level security, but there's not much there about application-level security. Overall, I found it a little terse.I like Stallings' books on networks and computer architecture better. ... Read more

Subjects:  1. Computer - Internet    2. Computer Books: Internet General    3. Computers    4. Computers - Communications / Networking    5. Internet - Security    6. Networking - General    7. Security - General    8. Computers / Internet / Security    9. Network security   


139. The .NET Developer's Guide to Windows Security (Microsoft .Net Development Series)
by Addison-Wesley Professional
Paperback (27 September, 2004)
list price: $44.99 -- our price: $29.69
(price subject to change: see help)
Isbn: 0321228359
Sales Rank: 47568
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (13)

5-0 out of 5 stars Must Read for .Net Security
I read the online book and then went out and purchased it here on Amazon.This is a awesome book.If you are new to security or your company is finally getting serious about security and you work in a .Net environment then this book is a must start resource.I cannot recall how many times I have recommended this book.I hope the author makes updates for .Net 2.0 as well as continues to extend the book online -- simply a great read!

5-0 out of 5 stars the .NET developer's first line of defense

5-0 out of 5 stars A good security cookbook
This book reminds me of a cookbook type of security book. There are 75 concise explanations of security topics and examples of how to do specific security coding. There are a lot of topics that are not .NET specific, but generally Windows security technology. I have experience with Windows security coding and have read Keith's previous book, "Programming Windows Security" so I have not read this book cover-to-cover, but use it when I need to know something specific. I have found this book very useful in those types of situations and the information in this book has saved me countless hours I would have spent trying to figure out this stuff on my own. ... Read more

Subjects:  1. Computer - Internet    2. Computer Bks - Languages / Programming    3. Computer Books: Languages    4. Computer security    5. Computers    6. Internet - Security    7. Microsoft .NET    8. Microsoft Windows (Computer fi    9. Microsoft Windows (Computer so    10. Operating Systems - Windows    11. Programming Languages - General    12. Security - General    13. Computers / Programming Languages / General    14. Data security & data encryption    15. Microsoft Windows   


140. Options Trading for the Conservative Investor: Increasing Profits Without Increasing Your Risk (Financial Times Prentice Hall Books)
by Financial Times Prentice Hall
Hardcover (13 May, 2005)
list price: $34.95 -- our price: $23.07
(price subject to change: see help)
Isbn: 0131497855
Sales Rank: 43974
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (9)

3-0 out of 5 stars Needs better organization
I wonder if there was an editor actually involved in the process of publishing this book.On the plus side, there are many excellent ideas presented in the book, however it is redundant, full of errors, and poorly organized.I was frustrated by the start of the book which assumed a much higher level of knowledge than I possesed being a beginner in options trading. But later chapters actually explained what was very unclear at the start of the book. I then had to go back over the beginning of the book to understand what the author was trying to say.It would have been much better to start simple and then increase the level of complexity.
5-0 out of 5 stars Lot of repetition
I would consider myself a value investor and don't buy stocks with large p/e, p/book or p/sales ratios. I never considered options, because I thought they were only for speculators, until I read an article in Barron's mentioning options in a conservative way. Then I came across this book, and I have to say, it is exactly what I was looking for. It explains in a great way how to use options when you're serious about "investing" and not a gambler/speculator.
4-0 out of 5 stars Options Trading ....Conservative Investor
This book has some good, practical strategies for using options within a conservative portfolio.I found some of the ideas in the book very useful. ... Read more

Subjects:  1. Business & Economics    2. Business / Economics / Finance    3. Business/Economics    4. Computer Books: General    5. Futures And Options Trading    6. Investments    7. Investments & Securities - General    8. Investments & Securities - Options    9. Options (Finance)    10. Personal Finance - Investing    11. Stock options    12. Business & Economics / Investments & Securities    13. Investment & securities   


121-140 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top