Books: 414

Security

CoverTitleYear
Leading Security Experts Explain How They Think
In Beautiful Security, today's security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems in the face of ever-increasing threats. You'll learn how new and more aggressive security measures work -- and where they will lead us. This far-reaching more » discussion takes you into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. « less
2009
An Enterprise Perspective on Risks and Compliance
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your more » virtual infrastructure and web applications secure. This book offers you sound advice from three well-known authorities in the tech security world. « less
2009
Proven Methods for Incident Detection on Enterprise Networks
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network -- first by teaching you which assets you need to monitor closely, and then by helping more » you develop targeted strategies and pragmatic techniques to protect them. These recommendations will help you select and deploy the very best tools to monitor your own enterprise network. « less
2009
What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional John Viega reports on the sorry state of security, with concrete suggestions for professionals and individuals confronting the issue. Provocative, insightful, more » and often controversial, The Myths of Security addresses IT professionals who deal with security issues, and speaks to Mac and PC users who spend time online. « less
2009
A Desktop Quick Reference
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. Its concise easy-to-use format provides all the information you need to get ready for the exams, including the four new A+ exams - the required Essentials more » exam and three elective exams that pertain to your area of specialization. « less
2007
Know Your Network
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, more » and reuse this testing model to design and deploy networks that are hardened and immune from attack. « less
2007
Ensuring the Safety of the Dynamic Web
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become more » a problem. Learn how to build secure Ajax applications and discover how to respond quickly when attacks occur. « less
2007
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push more » the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. « less
2007
Cryptography for Secure Communications
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to more » best meet those challenges. Focused on the practical, this book provides only the information that is necessary to use OpenSSL safely and effectively. « less
2002
Completely revised and much expanded, the new edition of the highly respected and bestselling Building Internet Firewalls now covers Unix, Linux, and Windows NT. This practical and detailed guide explains in step-by-step fashion how to design and install firewalls and configure Internet services to work more » with a firewall. It covers a wide range of services and protocols and offers a complete list of resources, including the location of many publicly available firewalls construction tools. « less
2000