BookBest US | UK | Germany
arts   biographies   business   children   computers   cooking   engineering  
entertainment   gay   health   history   home   law   medicine   nonfiction   outdoors   parenting   professional   reference   religion   science   sports   teens   travel  
 Help  
Computers & Internet - Web Development - Security & Encryption

141-160 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20

click price to see details     click image to enlarge     click link to go to the store

$31.04
141. Improving Web Application Security:
$24.14
142. The Executive Guide to Information
$34.99
143. Writing Information Security Policies
$26.39
144. Professional Pen Testing for Web
145. Hardening Windows Systems (Hardening)
$31.50
146. How to Break Software Security
$16.49
147. Google Hacks: Tips & Tools
$16.47
148. Network Security Hacks
$50.99
149. Introduction to Computer Security
150. Hacker's Challenge : Test Your
$37.79
151. Sun Certified Security Administrator
$32.99
152. Cisco(R) PIX (TM) Firewalls
$32.99
153. Windows Server 2003 (Hacking Exposed)
$45.65
154. Cisco Wireless LAN Security
$27.57
155. Ending Spam: Bayesian Content
$76.95
156. Principles of Information Security,
$20.67
157. Trade Options Online (Wiley Online
$86.35
158. The Practical Guide to HIPAA Privacy
$23.07
159. Kerberos: The Definitive Guide
$44.99
160. Quality Web Systems: Performance,

141. Improving Web Application Security: Threats and Countermeasures
by Microsoft Press
Paperback (24 September, 2003)
list price: $44.99 -- our price: $31.04
(price subject to change: see help)
Isbn: 0735618429
Sales Rank: 77239
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

5-0 out of 5 stars If you only get one book on .NET web security, get this one!
I'm a Microsoft Certified Solutions Developer with reasonable experience of .NET web development, but little or no understanding of how to secure the applications that I write. But not any more. This book is excellent! It covers securing .NET web applications under the 1.0 and especially the 1.1 .NET framework. It does NOT teach the basic .NET technologies, ie: how to create a web program, but it explains in good detail (without going overboard) how the security mechanisms of .NET work, and how best to secure a .NET web application. It's a big book, with chapters covering topics like code access security and how to configure a web app for medium trust, how to secure web services and Remoting servers, and how to harden IIS, Windows 2000 and SQL Server, and loads more!
4-0 out of 5 stars A great counter measure: Annonymization
A great counter measure to deter potential hackers, is to eliminate identifying server response data that is necessary to complete the request. You can do this by removing HTTP response data, modifying cookie values, and adjusting other response information.Any easy way to do this is with www.ServerMask.com for IIS 4, 5, & 6.

4-0 out of 5 stars Great ideas for countermeasures, less demonstration
I am in the business of writing secure e-biz apps and I found the security and countermeasure strategies in this book to be very thorough.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computers    4. General    5. Internet - Security    6. Security - General    7. Computers / General    8. Data security & data encryption    9. Network security   


142. The Executive Guide to Information Security: Threats, Challenges, and Solutions
by Addison-Wesley Professional
Paperback (30 November, 2004)
list price: $34.99 -- our price: $24.14
(price subject to change: see help)
Isbn: 0321304519
Sales Rank: 242056
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (9)

5-0 out of 5 stars This Book Is The Corner Stone of Your Security Initiative
This guide on security is OUTSTANDING.No one book can embody everything; however, this short but powerful book should encourage every person in our organization to accept responsibility for security.
5-0 out of 5 stars This book rocks!!
if you want to really, really, really know info sec, read this book.
5-0 out of 5 stars Lives up to it's title
This book is a very useful tool for getting non-IT executives to understand the imperative behind maintaining an information security management program. ... Read more

Subjects:  1. Business enterprises    2. Computer Books: General    3. Computer Data Security    4. Computer networks    5. Computers    6. Computers - Computer Security    7. Electronic commerce    8. Information Technology    9. Information Technology (Engineering)    10. Security - General    11. Security measures    12. Computers / Internet / Security    13. Data security & data encryption    14. Network security   


143. Writing Information Security Policies
Paperback (09 November, 2001)
list price: $34.99 -- our price: $34.99
(price subject to change: see help)
Isbn: 157870264X
Sales Rank: 88660
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (9)

5-0 out of 5 stars Best Condition, Timely Service
My book was in new condition, and I received my book, hassle free, in my postal box!!! It also arrived when I expected it to!

2-0 out of 5 stars Good if you want to reinvent the wheel!
This book is good if you want to start policy-writing project or want to do PhD in policy writing. In today fast moving world, you want best practices for the most commonly used polices, which you could review and quickly deploy. 4-0 out of 5 stars Not thorough or rigorous, but a good set of secpol topics
Security policies are not security, and will not provide any protection.However, as the well-known formulation has it:security is a process.An organization does not "have" security, rather they participate in the process of security.Barnum explains that security policies are a component of the planning aspect of the security process, and as such can provide three advantages.The first is to insure security interoperability across an organization.The second advantage is the visibility given to the policy by management's participation in it, which provides a greater impetus for implementation.The third is to mitigate liability, presumably by the legal value of the policy, and the advantages to security that a policy-driven approach proves.Another reason mentioned is that for some organizations, policy documentation is needed for iso900x compliance.Unstated is the assumption that a security policy might result in greater security.After all, even with all the other purported advantages, a security policy is presumptively about making security better.Read more

Subjects:  1. Computer Books: General    2. Computer security    3. Computers    4. Computers - Computer Security    5. Data protection    6. Management    7. Operating Systems - General    8. Operating Systems - Windows    9. Programming - General    10. Security - General    11. Computers / Internet / Security    12. Data security & data encryption    13. Management & management techniques   


144. Professional Pen Testing for Web Applications (Programmer to Programmer)
Paperback (05 July, 2006)
list price: $39.99 -- our price: $26.39
(price subject to change: see help)
Isbn: 0471789666
Sales Rank: 57821
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (3)

4-0 out of 5 stars An aptly named book on a crucial and modern security topic
I recently received copies of Hacking Exposed: Web Applications, 2nd Ed (HE:WA2E) by Joel Scambray, Mike Shema, and Caleb Sima, and Professional Pen Testing for Web Applications (PPTFWA) by Andres Andreu. I read HE:WA2E first, then PPTFWA. Both are excellent books, but I expect potential readers want to know which is best for them. I could honestly recommend readers buy either (or both) books. Most people should start by reading HE:WA2E, and then fill in gaps by reading PPTFWA.
5-0 out of 5 stars A "Must Have" for your technical library!
First things first, this book is not intended for newbies...That being said, this is by far the most comprehensive guide to application security that exists today.No other books out there can give you the depth and practical security knowledge that is presented here.
5-0 out of 5 stars Excellent book about web application security and pen testing
Taking a top-level view on the subject on pen testing web applications this book is a success.It does not focus on hack techniques only and certainly does not use case studies to just show off.The author provides an excellent balance of in-depth technical hacking information with the way the results from such activity get applied to the business of pen testing.Many other books simply show techniques or cover a case study and then move on, the author of this book, Andres Andreu, covers how to handle the results of such needle in the haystack work in order to make strides towards web presence protection.He is clearly not trying to generate more script kiddies but provide professionals the power to understand their security position in respect to web applications and take measures to protect themselves through this heightened awareness. Read more

Subjects:  1. Computer Books: Languages    2. Computer networks    3. Computer security    4. Computers    5. Computers - Communications / Networking    6. Computers - Languages / Programming    7. Internet    8. Networking - Security    9. Programming - Software Development    10. Security measures    11. Computers / Programming / Software Development    12. Data security & data encryption   


145. Hardening Windows Systems (Hardening)
by McGraw-Hill Osborne Media
Paperback (11 May, 2004)
list price: $39.99
Isbn: 0072253541
Sales Rank: 162651
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (9)

5-0 out of 5 stars Very Practical and Potent
I've looked into a few Hardening Windows type of books and I was not satisfied.I found Unix/Linux equivalents to be very practical and valuable, and most to the Windows books to be just general guides of common obvious solutions mentioned in core MSCE training. Where is the real tangible stuff?
5-0 out of 5 stars Excellent book on securing Windows
Does a week ever go by without a major Windows vulnerability coming to light? It is evident that, prior to Windows XP Service Pack 2, the operating system was geared to file and printer sharing, not security. Among security professionals, the common view is that the best way to secure Windows is to use a more secure operating system such as Linux.
4-0 out of 5 stars A good overview of Windows Security
I was very pleased with this book.One of the problems I've had with most books on network security is that they go on and on about theory and then leave it to you to turn their high level discussion into actual practice.
Read more

Subjects:  1. Computer Books: Operating Systems    2. Computer networks    3. Computer security    4. Computers    5. Computers - Operating Systems    6. Microcomputer Operating Environments    7. Microsoft Windows (Computer fi    8. Microsoft Windows (Computer so    9. Networking - General    10. Operating Systems - Windows    11. Security - General    12. Security measures    13. Computers / Security    14. Operating systems & graphical user interfaces (GUIs)   


146. How to Break Software Security
by Addison Wesley
Paperback (09 May, 2003)
list price: $37.95 -- our price: $31.50
(price subject to change: see help)
Isbn: 0321194330
Sales Rank: 95396
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

2-0 out of 5 stars Good ideas, but fails to follow through
The book categorizes software testing for security defects into attacks on software dependencies, user interfaces, design and implementation. The book focuses on 19 attacks (one being "overflow input buffers"), which form the core of the book. Parts 2 and 3 of the book explain when and how to apply each attack and what faults they find. Part 4 takes a more hands-on look at how to perform the testing.
2-0 out of 5 stars Holodeck rules! - Does it?
The whole book feels like a promotion for Holodeck tool. Some of the chapters are very straightforward: boot your AUT (Application Under Test) from Holodeck and see what happens. However, the version of the tool supplied with the book isn't supported by anybody and, sure enough, it doesn't work with my AUT. The supported one is above $1K for single user licence...
5-0 out of 5 stars Security testing for QA folks, also good for infosec folks
I'm the type of person who won't buy a tech book unless it's worth reading and referring to, and it didn't take much skimming to realize this was going to be worth it. My opinion hasn't changed since finishing it. I had a specific need for information on non-web application penetration (security) testing and I was surprised to find exactly what I needed in this book, and in a short, easy-to-read package including a CD with two unique tools to help apply what it teaches.
Read more

Subjects:  1. Computer Bks - Languages / Programming    2. Computer Books: General    3. Computer Data Security    4. Computer security    5. Computer software    6. Computers    7. Computers - Languages / Programming    8. Programming - Software Development    9. Reliability    10. Security - General    11. Software Development    12. Testing    13. Computers / Programming / Software Development    14. Software engineering   


147. Google Hacks: Tips & Tools for Finding and Using the World's Information (Hacks)
by O'Reilly Media
Paperback (03 August, 2006)
list price: $24.99 -- our price: $16.49
(price subject to change: see help)
Isbn: 0596527063
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Everyone loves Google, and it's the first place many people turn to locate information on the Internet. There's a big gap, though, between knowing that you can use Google to get advance information on your blind date and having a handle on the considerable roster of fact-finding tools that the site makes available.

Features

  • Illustrated

Reviews (55)

5-0 out of 5 stars A SIMPLE GOOGLE SEARCH!!
Do you want to make your Google searching experience more fruitful? If you do, then this book is for you! Authors Rael Dornfest, Paul Bausch and Tara Calishain, have done an outstanding job of writing a third edition of a book that goes beyond the instruction page to the idea of hacks.
5-0 out of 5 stars A Must-Have
Nobody browses the web anymore - we all search for whatever we want. This book helps you understand the dark secrets of Google and makes your time on the web more valuable. I only wish I'd bought itsooner!
5-0 out of 5 stars New 3rd edition shows Google's expanded capabilities
Google entered the world of search engines in 1998. It was a second incarnation of a search engine service known as BackRub. The name Google was a play on the word googol: a one followed by a hundred zeros. From the beginning, Google was different from the other major search engines online, winning converts with its friendly presentation and constantly expanding set of options.
Read more

Subjects:  1. Computer - Internet    2. Computer Books: General    3. Computer software    4. Computers    5. Information Storage & Retrieval    6. Internet - Browsers    7. Internet - General    8. Internet - Web Site Design    9. Internet - Web Site Directories    10. Internet programming    11. Reusability    12. Security - General    13. Web search engines    14. Computer / Internet    15. Computers / Internet / General    16. Computers / Internet / Web Site Directories    17. Google, Google Maps, Maps, API, Google Earth, Google Print, Google Blog Search, Google Video Search    18. Internet    19. Internet searching   


148. Network Security Hacks
by O'Reilly Media
Paperback (01 April, 2004)
list price: $24.95 -- our price: $16.47
(price subject to change: see help)
Isbn: 0596006438
Sales Rank: 84390
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (13)

5-0 out of 5 stars Network Security Hacks
The book is very well written in a professional form. I was able tolearn a lot out of it. It should be in every IT security persons library. But it is not a book for beginners. Although all issues are well explained, a certain computer background is needed, and not basic knowledge only. The book is worth its price.
4-0 out of 5 stars A good book for both Linux and Windows
First, I write software professionally. I write software, I am not a Sys Admin (which is hard work I might add; System Administration is for hardcore people.) This book saved me money by giving me answers to problems that would have taken me days to find the answers to by searching the internet.
4-0 out of 5 stars insight into security
Security has been high on my list of things to understand and master these past two years. Our company's firewall has been breached numerous times. This has scared the living daylights out of our stakeholders. I have therefore been forced to become an expert. This is one of the books that has helped me attain this level of understanding. It offers insights not available in regular how to guides on security. ... Read more

Subjects:  1. Computer Books: Operating Systems    2. Computer Data Security    3. Computer networks    4. Computers    5. Computers - Computer Security    6. Networking - General    7. Operating Systems - Linux    8. Operating Systems - UNIX    9. Security - General    10. Security measures    11. Computers / Computer Security    12. Computers / Security    13. Computers/Networking - General    14. Data security & data encryption   


149. Introduction to Computer Security
by Addison-Wesley Professional
Hardcover (26 October, 2004)
list price: $59.99 -- our price: $50.99
(price subject to change: see help)
Isbn: 0321247442
Sales Rank: 373583
Average Customer Review: 3.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

1-0 out of 5 stars A poor excuse for a security textbook
This book has seen better days.The author appears to have cut-and-pasted hundreds of UNIX references into the book "in order to beef it up..." I assume.If you look at the references in the back of the textbook, many of them date from the mid-1980s.For example, his discussion of viruses and worms make NO reference to Code Red (or subsequent worms) but have extensive cut-and-paste data from a 1985 IEEE paper.You get the picture.Most of his other chapters are the same.

3-0 out of 5 stars A College Level Texbook on Computer Security
This book is as its title implies, an introduction level text on computer security. Its style and occupation of the Author indicate that it is a college level textbook on the subject. As far as giving a foundation level grounding on the subject, it covers all the usual bases and as such is worth the read. It is not a practical guide however.
3-0 out of 5 stars Not bad, I guess.
While I hail from academic background, this book was too much at times for me. The book does contain some fun and useful information on security theory, which is presented well (no mean feat!). The fans of Bell-LaPadula model and such things will find them in the book.
Read more

Subjects:  1. Computer Books: General    2. Computer Data Security    3. Computer security    4. Computers    5. Computers - Computer Security    6. Security - General    7. Computers / Security    8. Data security & data encryption    9. Network security   


150. Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
by McGraw-Hill Companies
Paperback (18 October, 2001)
list price: $29.99
Isbn: 0072193840
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Editorial Review

Mike Schiffman has hit upon a great formula for Read more

Reviews (21)

4-0 out of 5 stars Good, but scenarios getting out of date
The Challenge/Solution style of these books are great for security beginners as well as seasoned professionals.If you read carefully you can pick up many hints/tools which you can use in real life security scenarios.
1-0 out of 5 stars uhm..
this book sucks.plain and simple. i have some respect for the author, i've used his libnet and he's a funny guy.. but this book is garbage.the last good thing mike schiffman wrote was libnet, and after that he figured why not just take it easy and write dumb books like this for the rest of his life, be a manager @stake and get paid way more than the researchers who are doing the actual work. he goes into stupid crap like backdoors in inetd.conf, how outdated can you get..what is this?incident response to that crappy phrack article he wrote years and years ago about simple unix backdoors?hah.the real challenge here is for a real hacker to read the whole book and maintain his sanity.

5-0 out of 5 stars GOOD Book
I have read many books about network security, but none had put it so easy to actually test the knowledge gain from my reading.Read more

Subjects:  1. Computer Books: Operating Systems    2. Computer Data Security    3. Computers    4. Computers - Communications / Networking    5. Networking - General    6. Security    7. Security - General   


151. Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
by McGraw-Hill Osborne Media
Paperback (14 June, 2005)
list price: $59.99 -- our price: $37.79
(price subject to change: see help)
Isbn: 0072254238
Sales Rank: 296617
Average Customer Review: 3.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (5)

1-0 out of 5 stars Not suoitable for sun solaris 10 security exam
Took sun solaris 10 security exam today, the exam is very heavy on containers (Global vs non global, how to configure BART inglobal environment and will it flow down to non global), how to perform patching in global and non global environment, what is easiest way to setup 20 containers inside the same machine, definitions of key terms in Kerberos, what does kerberos each component do (drag and drop) and SFM and ipsec and ip filters syntax to block dns lookup. How to update the system automatically and what commands to use for automatic updating choose all correct commands . The textbook only covers 30% of the solaris 10 test only.

1-0 out of 5 stars Unclear, unfocussed and hard to use
Unlike some of the other reviewers, I find this book quite useless. I am a system administrator with more than 8 years experience on the Sun platform.
5-0 out of 5 stars Good study guide but you still need hands on experience
This is a very good study guide for the Sun Certified Security Administrator for Solaris Certification. However you will also need and should have some hand on experience with the OS. Don't worry though you can download the OS free at Sun for both SPARC and Intel platforms.
Read more

Subjects:  1. Certification    2. Certification Guides - General    3. Computer Books: Operating Systems    4. Computers    5. Computers - Certification    6. Data Processing - General    7. Electronic data processing personnel    8. Operating Systems - General    9. Operating Systems - UNIX    10. Operating systems (Computers)    11. Security - General    12. Study guides    13. Computers / Technical Skills    14. Operating systems & graphical user interfaces (GUIs)   


152. Cisco(R) PIX (TM) Firewalls
by McGraw-Hill Osborne Media
Paperback (23 October, 2002)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072225238
Sales Rank: 73763
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (15)

5-0 out of 5 stars A valuable source of information
Its contents is the best I was able to find for a relatively novice. It covers all areas with examples and diagrams that complement the explanations. A must have for newbies.

5-0 out of 5 stars excellent resource
It gave a great for overview for beginners and yet still has good information to be kept as a reference.He also has over 100 additional pages of info on his website.Great Buy

5-0 out of 5 stars Great PIX reference
This is a great book on how to use the Cisco PIX firewall.
Read more

Subjects:  1. Computer Books: Internet General    2. Computer Data Security    3. Computer networks    4. Computers    5. Computers - Communications / Networking    6. Data Transmission Standards And Protocols    7. Firewalls (Computer security)    8. Internet - Security    9. Networking - General    10. Networking - Network Protocols    11. Security - General    12. Security measures    13. Computers / Security    14. Data security & data encryption    15. Network security   


153. Windows Server 2003 (Hacking Exposed)
by McGraw-Hill Osborne Media
Paperback (27 October, 2003)
list price: $49.99 -- our price: $32.99
(price subject to change: see help)
Isbn: 0072230614
Sales Rank: 64066
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (7)

4-0 out of 5 stars Good stuff
If you are working with Windows Server 2003 security, this is pretty good stuff. For one thing, it gives you the background on a lot of the security features that Microsoft has placed in Group Policy as well as their security recommendations in White Papers. By the way, I suggest you download the Threats and Countermeasures guide from the Microsoft web site, if you don't already have it. That would go very well with this book!

5-0 out of 5 stars Excellent Resource for Windows Server 2003 Admins
Hacking Exposed- Windows Server 2003 is the latest addition to the Hacking Exposed series of books. Joel Scambray and Stuart McClure have teamed up to create another excellent source of information to help you understand the weaknesses in your Windows Server 2003 system and what you can do to defend against them.
4-0 out of 5 stars Not the ultimate Windows 2003 security book, but still solid
"Hacking Exposed: Windows 2000" (HE:W2K) was published in August 2001, eight months after the W2K OS was released to manufacturing (RM) in December 1999."Hacking Exposed: Windows 2003" (HE:W03) was published in October 2003, seven months after the Windows 2003 OS was RTM.Does the shorter gap between OS availability and book publication hurt the successor to the original hit Windows security book?It's possible, but I don't see many contenders for the title of best Windows assessment guide.Because this book delivers the technical goods in a proven format, I give HE:W03 four stars.Read more

Subjects:  1. Computer Bks - Communications / Networking    2. Computer Books: General    3. Computer security    4. Computers    5. Computers - Computer Security    6. Microcomputer Operating Environments    7. Microsoft Windows (Computer fi    8. Microsoft Windows (Computer file)    9. Networking - General    10. Security - General    11. Computer Communications & Networking    12. Computer fraud & hacking    13. Computers / Security    14. Data security & data encryption    15. Microsoft Windows   


154. Cisco Wireless LAN Security
by Cisco Press
Hardcover (15 November, 2004)
list price: $55.00 -- our price: $45.65
(price subject to change: see help)
Isbn: 1587051540
Sales Rank: 159722
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

5-0 out of 5 stars Excellent Resource for Any WLAN Administrators
The four authors of Cisco Wireless LAN Security do an excellent job of striking a balance between writing concise enough that the book is not overwhelming, but detailed enough for the reader to truly understand the subject matter. Not an easy task.
4-0 out of 5 stars how to bolt down your wireless LAN
The title explicitly says Cisco, and indeed there is a lot of material enclosed that is specific to how Cisco implements its wireless routers. But you could plausibly also use this book as a good guideline to general purpose wireless security.
5-0 out of 5 stars Great addition to the official CWSP study guide
For many people, it is very difficult to get your hands on enterprise-class wireless equipment to prepare for the CWNA and CWSP exams. The good news it, this book gives you a "virtual" experience with Cisco hardware capabilities. However, don't let the title fool you, this is a great reference on wireless security in general. The most "Cisco-specific" chapter is chapter 9, "SWAN: End-to-End Security Deployment" and this chapter is only 20 pages long.
Read more

Subjects:  1. Computer Bks - Communications / Networking    2. Computer Books: General    3. Computer Data Security    4. Computers    5. Computers - Communications / Networking    6. Data Transmission Systems - General    7. IEEE 802.11 (Standard)    8. Local Area Networks (Lan)    9. Networking - Local Area Networks (LANs)    10. Security - General    11. Security measures    12. Wireless LANs    13. Computers / Data Transmission Systems / General    14. Local area networks (LANs)    15. Network security   


155. Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
by No Starch Press
Paperback (01 July, 2005)
list price: $39.95 -- our price: $27.57
(price subject to change: see help)
Isbn: 1593270526
Sales Rank: 128133
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (10)

5-0 out of 5 stars Great
Awesome read.For those who are in the SpamAssassin mindset and are considering DSPAM, this is a definite must!

4-0 out of 5 stars Nice overview ... but leaves you wanting more
Ending Spam from Mr. Zdziarski is a well written BASIC and easy to understand INTRODUCTION to get a technical overview of todays spam fighting solutions on themarket.
5-0 out of 5 stars Will the spam problem be solved?
The problem of spam is of enormous significance. You may spend only a few minutes a day deleting unwanted unsolicited e-mail. Yet multiply this time spent by the number of individuals dealing with the same task and you have unwanted work of an extraordinary magnitude. In Ending Spam Jonathan A. Zdziarski provides a highly readable, while at the same time, technical treatment of the problem of spam. The reader of this lucid work will acquire background in the history, theory and current direction of spam detection technology.
Read more

Subjects:  1. Computer Books: Internet General    2. Computer programs    3. Computers    4. Computers - Communications / Networking    5. Data Transmission Systems - General    6. Electronic mail systems    7. Filters (Mathematics)    8. Internet - Security    9. Networking - Local Area Networks (LANs)    10. Security measures    11. Spam filtering (Electronic mail)    12. Unsolicited electronic mail me    13. Computers / Communications / Networking    14. Computers / Data Transmission Systems / Electronic Mail    15. Computers / Data Transmission Systems / General    16. Prevention    17. Spam (Electronic mail)    18. spam, Bayesian, Bayesian filtering, language classification, DSPAM, SpamAssassin, tokenization, Paul Graham, statistical filtering, UCE, unsolicited commercial email   


156. Principles of Information Security, Second Edition
by Course Technology
Paperback (23 November, 2004)
list price: $76.95 -- our price: $76.95
(price subject to change: see help)
Isbn: 0619216255
Sales Rank: 38160
Average Customer Review: 4.5 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (4)

5-0 out of 5 stars Perfect Introduction Book
I have just finished my sophomore year in college and in my first course relating to information and computer security we used this book. I would recommend it to anybody who is interested in getting into the rapidly expanding field of infosec.
3-0 out of 5 stars Content Filled - Very Technical
I'm using this book for an introductory college course to Information Security. The book has a ton of content covering every aspect of the subject, but not well written for the introductory person.I'm very knowledgable of computers, but this book requires a different type of knowledge.Have a basis in information technology before checking out this book.

5-0 out of 5 stars teacher edition
Do you know where i can get the teachers edition to this book? ... Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - General Information    4. Information Management    5. Information Technology    6. Management Information Systems    7. Computers / Information Technology    8. Data security & data encryption   


157. Trade Options Online (Wiley Online Trading for a Living)
by Wiley
Hardcover (27 October, 2000)
list price: $29.95 -- our price: $20.67
(price subject to change: see help)
Isbn: 0471359386
Sales Rank: 16930
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (24)

4-0 out of 5 stars Good primer but not very useful for traders
This text contains a lot of information on online trading in general and trading of options in particular. But be careful, you need to know more than that to succeed in this business. Although this book will tell you how to go about placing your orders and which option strategy is good for which situation, making money comes down to predicting the behavior of your stock price and volatility, something you will have to learn elsewhere. Incidentally the book was most likely written to increase subscriber base of the author's website, so don't let your guard down.

2-0 out of 5 stars Time value of that book is zero
First 8 chapters give you a very superficial introduction to the options trading and some strategies. Let me repeat - very superficial. If you want to learn that matter, you definetely need another book.2-0 out of 5 stars Decent Introduction to the Options Arena
I won't pretend to be an expert option trader.I'm in my third year of seeking a bachelor's, and the degree will not be very finance or investing related.This is the first book I read about options, and it successfully heightened my interest by introducing me to some basic option strategies.Another success of the book is the advice it gives on how to initiate and monitor trades throughout the trading day.Read more

Subjects:  1. Business & Economics    2. Computer Books: Internet General    3. Computer network resources    4. Computers - Communications / Networking    5. E-Commerce - Online Trading    6. Electronic Commerce    7. Futures And Options Trading    8. Internet    9. Internet - General    10. Investments    11. Investments & Securities - General    12. Options (Finance)    13. Stocks    14. Applications of Computing    15. Business & Economics / Finance    16. Investment & securities    17. Investments & Securities - Options   


158. The Practical Guide to HIPAA Privacy and Security Compliance
by AUERBACH
Hardcover (24 November, 2003)
list price: $89.95 -- our price: $86.35
(price subject to change: see help)
Isbn: 0849319536
Sales Rank: 399809
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (6)

5-0 out of 5 stars Barry Fergus Jones, CISM CISSP
This is the best single reference that I've seen on the subject.Kevin and Rebecca have assembled a guide that is eminently practical, superbly organized, and tremendously helpful.I reach for it every time I have a question on HIPPA.In fact, it's the only HIPPA reference I've used since I got it.

5-0 out of 5 stars Excellent resource everyone involved in HIPAA should have
Rebecca and Kevin have created an excellent resource for HIPAA Security Practictioners. They provide practical guidance for interpreting the HIPAA security rule, in terms that the non-security professional can understand. Especially of value are the ideas on how to "implement" the security rule, broken down by the relevant HIPAA security standard. I agree with the practical approach that they take within the book, as it is consistent with the HIPAA message that I have also been communicating over the past several years. There are also useful lists of items needed to maintain security compliance after implementation. This is a good book for the novice and experienced privacy/security professional. It is nice to see that someone has compiled this much useful information into one book. Nice job ! This is a must have book if you are a Security of Privacy Officer.

5-0 out of 5 stars A must have for all Information Security Professionals!
As the title states, the book provides a very practical guide to HIPAA Privacy and Security.I used this book as a key reference to understanding the HIPAA privacy and security rule and in building a comprehensive roadmap (project plan) for compliance -- nicely done!Read more

Subjects:  1. Access control    2. Law and legislation    3. Legal Reference / Law Profession    4. Medical    5. Medical care    6. Medical records    7. Public    8. Security measures    9. United States    10. Computers / Security    11. Teaching of a specific subject   


159. Kerberos: The Definitive Guide
by O'Reilly Media
Paperback (26 August, 2003)
list price: $34.95 -- our price: $23.07
(price subject to change: see help)
Isbn: 0596004036
Sales Rank: 158725
Average Customer Review: 4.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Features

  • Illustrated

Reviews (5)

4-0 out of 5 stars Good Starting Point
This has very superb explanations about the Kerberos authentication concepts.As a Windows system administrator, this has helped me immensely in understanding what's under the hood of Active Directory.
4-0 out of 5 stars Kerberos intimidates a lot of people, don't be one of them
I got started using Kerberos many moons ago, at my university. This is probably how many people got to know about it. While I didn't use it very much, it's there that I learned the basics and experimented a bit with Kerberos. Interest in it took off after Microsoft incorporated Kerberos authentication mechanisms into Windows 2000. Suddenly it wasn't such arcane knowledge.
4-0 out of 5 stars Reasonably thorough introduction and guide, but needs updated
Like most O'Reilly titles, this book covers the general topics one needs to be conversant in a given topic.Take what you read, do a few web searches, experiment with the technology, discuss the concepts with others - this book will give you a solid foundation to get started.Moreover, like other O'Reilly topics one can see errata, etc. on the O'Reilly website.This book easily meets the high expectations one has of a book from this publisher: conversational tone, lots of hands-on examples, and broad coverage of applications using this technology.
Read more

Subjects:  1. Access control    2. Computer Books: General    3. Computer Books: Integrated Systems    4. Computer networks    5. Computers    6. Computers - Communications / Networking    7. Networking - General    8. Security - General    9. Security measures    10. Computers / Communications / Networking    11. Computers / Networking / General    12. Computers / Security    13. Computers/Security - General    14. Kerberos, authentication, authorization, encryption, dns, windows, solaris, xp, kdc, Heimdal    15. Network security   


160. Quality Web Systems: Performance, Security, and Usability
by Addison-Wesley Professional
Paperback (23 August, 2001)
list price: $44.99 -- our price: $44.99
(price subject to change: see help)
Isbn: 0201719363
Sales Rank: 245140
Average Customer Review: 5.0 out of 5 stars
US | Canada | United Kingdom | Germany | France | Japan

Reviews (8)

5-0 out of 5 stars Thorough and practical
This book covers quality assurance of web systems beyond merely testing. It offers practical insight for designers, developers, project managers and quality assurance team members. A big bonus is the appendix which details and compares automated test tools.

5-0 out of 5 stars A must-have for any web systems tester
This book is excellent for any web systems tester. It covers all areas of functional and non-functional testing related to the Web.5-0 out of 5 stars Excellent book on various quality topics
This book was a joy to read. It gives a great overview of quality issues within "Web systems" - meaning Web applications and architectures. The book balances a too-specific look with a too-general look and succeeds quite well in a balanced treatment that will make the whole worth the attention of any quality assurance or quality tester professional in the Information Technology industry.Read more

Subjects:  1. Computer Books: General    2. Computers    3. Computers - Languages / Programming    4. E-Commerce - General    5. Internet - General    6. Programming - Software Development    7. Quality control    8. Web site development    9. Web sites    10. Computers / Internet / Web Site Design    11. Data security & data encryption    12. World Wide Web (WWW)    13. Software Testing   


141-160 of 200     Back   1   2   3   4   5   6   7   8   9   10   Next 20
Prices listed on this site are subject to change without notice.
Questions on ordering or shipping? click here for help.

Top