Security Books



Bookstore > Books > Security

Learning OpenCV

Learning OpenCV

by Gary Bradski, Adrian Kaehler

This library is useful for practitioners, and is an excellent tool for those entering the field: it is a set of computer vision algorithms that work as advertised. -William T. Freeman, Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of TechnologyLearning OpenCV puts you in the middle of the rapidly expanding field of computer vision. Written by the creators of the free open ...

Price:  $11.61  |  Publisher:  O'Reilly Media  |  Release:  2008

Microsoft SQL Server 2008 Management and Administration

Microsoft SQL Server 2008 Management and Administration

by Ross Mistry, Hilary Cotter

If you need to deploy, manage, or secure Microsoft SQL Server 2008, this is the complete, fast-paced, task-based reference you've been searching for. Authored by a world-class expert on SQL Server in the enterprise, this book goes far beyond the basics, taking on the complex tasks that DBAs need to make the most of Microsoft's flagship database platform. SQL Server MVP, Ross Mistry presents proven technique...

Price:  $9.87  |  Publisher:  SAMS Publishing  |  Release:  2008

Windows Server 2008 Inside Out

Windows Server 2008 Inside Out

by William R. Stanek

Learn how to conquer Windows Server 2008 - from the inside out! Designed for system administrators, this definitive resource features hundreds of timesaving solutions, expert insights, troubleshooting tips, and workarounds for administering Windows Server 2008 - all in concise, fast-answer format. You will learn how to perform upgrades and migrations, automate deployments, implement security features, manag...

Price:  $4.49  |  Publisher:  Microsoft Press  |  Release:  2008

Visual Basic 2008 Recipes

Visual Basic 2008 Recipes

by Rakesh Rajan, Todd Herman, Allen Jones, Matthew MacDonald

Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this book. Important .NET 3.5 technologies, such as Windows Presentation Fra...

Price:  $38.69  |  Publisher:  Apress  |  Release:  2008

Hacking VoIP

Hacking VoIP

by Himanshu Dwivedi

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sens...

Price:  $16.85  |  Publisher:  No Starch Press  |  Release:  2008

Oracle Web Services Manager

Oracle Web Services Manager

by Sitaraman Lakshminarayanan

Secure your web services using Oracle WSMAuthenticate, Authorize, Encrypt, and Decrypt messages. Create Custom Policy to address any new Security implementation. Deal with the issue of propagating identities across your web applications and web services. Detailed examples for various security use cases with step-by-step configurations....

Price:  $35.99  |  Publisher:  Packt Publishing  |  Release:  2008

Zenoss Core Network and System Monitoring

Zenoss Core Network and System Monitoring

by Michael Badger

For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. At some point it will be necessary to read the network traffic directly instead of monitoring application level details. Network security audits, debug network configurations, and usage patterns analyzing can all require network traffic monitoring. This task can be achieved by using netwo...

Price:  $7.43  |  Publisher:  Packt Publishing  |  Release:  2008

Hacking Exposed Windows, 3rd Edition

Hacking Exposed Windows, 3rd Edition

by Joel Scambray

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, an...

Price:  $6.99  |  Publisher:  McGraw-Hill  |  Release:  2007

Hacking Exposed Web 2.0

Hacking Exposed Web 2.0

by Rich Cannings, Himanshu Dwivedi, Zane Lackey

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in ...

Price:  $12.03  |  Publisher:  McGraw-Hill  |  Release:  2007

Security Metrics

Security Metrics

by Andrew Jaquith

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activ...

Price:  $39.56  |  Publisher:  Addison-Wesley  |  Release:  2007

Pages: ←Previous | 1 ... 54, 55, 56, 57, 58 ... 60 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.