Netcat Power Tools
6,339円 Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, ...
PCI Compliance
6,856円 PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security Standard (PCI DSS) is and wh...
Defense in Depth: An Impractical Strategy...
500円 Businesses and Information Technology Security Professionals have spent a tremendous amount of time, money and resources to deploy a Defense in Depth approach to Information Technology Security. Yet successful attacks against RSA, HB Gary, Booz, Allen & Hamilton, the United States Military, and m...
Crime Online
9,616円 Crime Online is concerned to explore the dual capacity of the Internet to pervert and to democratize: it offers its users freedom, democracy, and communication with people around the world while at the same time generating anxieties concerning its potential to corrupt vulnerable minds and facilit...
X-Ways Forensics Practitioner’s Guide
6,233円 The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-...
Designing an IAM Framework with Oracle Id...
7,047円 From Oracle Press--a trusted advisor's guide to the lifecycle of an identity and access management (IAM) project with Oracle Identity and Access Management Suite Designing an IAM Framework with Oracle Identity and Access Management Suite is a comprehensive approach to an IAM project with Oracle I...
Network Security Tools
2,534円 If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information...
Cryptography for Developers
7,000円 The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as requi...
Securing SQL Server
5,282円 SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break in...
Security and Privacy in Mobile Social Net...
6,076円 This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their person...
Professional Penetration Testing
8,348円 Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingーthe act of testing a computer network to find security vulnerabilities before they are maliciously exploitedーis a crucial component of information security in any ...
Beautiful Security
2,895円 Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, ...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!