We found 29 results for “


Showing 1 - 12 of 29 Results

Out of stock online

Not available in stores

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are…

In stock online

Not available in stores

By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information…

In stock online

Not available in stores

The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack "adequate" protection of privacy. If enforced as written, the…

Paperback

$51.98 online

$51.99

In stock online

Not available in stores

"Avi Rubin does a great job of explaining the motivations behind many security solutions, as well as providing practical information about how you can solve real-world problems. White-Hat Security Arsenal is an invaluable resource--a judicious mix of practical…

Paperback

$162.50

In stock online

Not available in stores

This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.

Paperback

$45.95

In stock online

Not available in stores

ONE-STOP GUIDE TO CONFIGURING CISCO ACCESS LISTS. Configuring access lists for Cisco Routers and for network operations is one of the most difficult tasks for network administrators working in a Cisco networking environment. Cisco- Access Lists Field Guide, by…

Ships within 1-2 weeks

Not available in stores

Cryptography is a core component of computer security, as it is both the lock and combination or key that can help protect an organization's data. Easily read by non-specialists, yet still systematic and comprehensive enough to offer cryptographic meat for those…

In stock online

Not available in stores

Fast becoming the electronic payment method of choice for many major financial companies today, SET (secure electronic transactions) is a unique new protocol that allows credit card information to be safely and securely transmitted over the Internet. Here's a…

Paperback

$20.95

In stock online

Not available in stores

Kerberos authentication offers a proven, non-proprietary solution for maximizing the security of virtually any computing system without compromising performance. This is the first authoritative, accessible guide to Kerberos for both users and administrators.…

In stock online

Not available in stores

Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals…

In stock online

Not available in stores

This volume contains the latest accounts of research supported by the European Commission in human-computer interaction and presented at a workshop on Human Comfort and Security in October 1995. Topics of the papers include: removing usability barrier, user…

In stock online

Not available in stores

This book constitutes the thoroughly revised post-conference proceedings of the Second International Conference on Financial Cryptography, FC '98, held in Anguilla, British West Indies, in February 1998. The 28 revised papers presented were carefully selected…