search for books and compare prices
computers access control matches 31 work(s)
at beginning | displaying 1 to 25 | next 6 >
Jump to start at |
show results in order: alphabetically | oldest to newest | newest to oldest
cover image for 9780128021491
Product Description: Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples...read more

Paperback:

9780128021491 | 4th edition (Syngress Media Inc, November 1, 2016), cover price $59.95 | also contains Penetration Tester's Open Source Toolkit | About this edition: Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples.
9781597496278 | 3 edition (Syngress Media Inc, July 18, 2011), cover price $49.95 | About this edition: Penetration Tester’s Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply.

cover image for 9781138857063
Product Description: After the end of Euro-American hegemony and the return of the multi-centric world, Eurocentrism in philosophy and the social sciences has come under attack. However, no real alternative has been proposed. This provides an opportunity to reassess the philosophy of the social sciences that has been developed in the West...read more
By Michael Kinville (trans)

Hardcover:

9781138857063 | Routledge, March 26, 2015, cover price $145.00 | About this edition: After the end of Euro-American hegemony and the return of the multi-centric world, Eurocentrism in philosophy and the social sciences has come under attack.
9780387979304, titled "Differential Cryptanalysis of the Data Encryption Standard" | Springer Verlag, April 1, 1993, cover price $99.00 | also contains Differential Cryptanalysis of the Data Encryption Standard | About this edition: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem.

cover image for 9780134000022
Product Description: The Definitive Guide to Building Firewalls with Linux   As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically. In Linux® Firewalls, Fourth Edition, long-time Linux security expert Steve Suehring has revamped his definitive Linux firewall guide to cover the important advances in Linux security...read more

Paperback:

9780134000022 | 4th edition (Prentice Hall, February 8, 2015), cover price $49.99 | About this edition: The Definitive Guide to Building Firewalls with Linux   As the security challenges facing Linux system and network administrators have grown, the security tools and techniques available to them have improved dramatically.

cover image for 9781482203516
Product Description: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks...read more

Hardcover:

9781482203516 | Auerbach Pub, January 29, 2014, cover price $149.95 | About this edition: The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks.

cover image for 9780124081406
Product Description: Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation...read more

Paperback:

9780124081406 | Syngress Media Inc, November 26, 2013, cover price $59.95 | About this edition: Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions.

cover image for 9781466564121
Product Description: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy...read more

Hardcover:

9781466564121 | Auerbach Pub, November 19, 2013, cover price $125.95 | About this edition: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN).

cover image for 9783642265761
Product Description: The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.

Hardcover:

9783642143021 | Springer-Verlag New York Inc, October 29, 2010, cover price $169.00 | About this edition: In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs.

Paperback:

9783642265761 | Springer-Verlag New York Inc, January 2, 2013, cover price $169.00 | About this edition: The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation.

cover image for 9781461393160
Product Description: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970`s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search...read more

Hardcover:

9780387979304 | Springer Verlag, April 1, 1993, cover price $99.00 | also contains Critical Theory After the Rise of the Global South: Kaleidoscopic Dialectic | About this edition: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem.

Paperback:

9781461393160 | Reprint edition (Springer-Verlag New York Inc, November 9, 2011), cover price $119.00 | About this edition: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem.

cover image for 9781449626365
Product Description: While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment...read more

Paperback:

9781449626365, titled "Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System" | 2 edition (Wordware, April 29, 2012), cover price $94.95 | About this edition: While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment.
9781598220612 | Wordware, May 4, 2009, cover price $55.95 | About this edition: With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats.
9780226393179, titled "Institution Building in Urban Education" | Univ of Chicago Pr, February 1, 1972, cover price $1.95 | also contains Institution Building in Urban Education | About this edition: Presents a sociological perspective on the issues involved in transforming the structure of inner city schools.

cover image for 9781592294060
Product Description: Work smarter with authorizations! Have you ever had an unauthorized user access something in your system that you could have sworn was off limits? Here you go: SAP PRESS equips you with "100 Things" that unlock the secrets of managing your security and authorizations in SAP.

Paperback:

9781592294060 | Sap Pr America, March 31, 2012, cover price $59.95 | About this edition: Work smarter with authorizations!

cover image for 9781610391061
Product Description: Updated with a new Afterword“The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran. But as journalist and social commentator Evgeny Morozov argues in The Net Delusion, the Internet is a tool that both revolutionaries and authoritarian governments can use...read more

Hardcover:

9781586488741 | Public Affairs, January 4, 2011, cover price $27.95 | also contains The Dotcom Doctrine: Making the World Less Safe for Democracy, The Dotcom Doctrine: Promoting Democracy in the Digital Era | About this edition: “The revolution will be Twittered!

Paperback:

9781610391061 | Reprint edition (Public Affairs, February 28, 2012), cover price $16.99 | About this edition: Updated with a new Afterword“The revolution will be Twittered!

cover image for 9781597497312
Product Description: In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras...read more

Paperback:

9781597497312 | Syngress Media Inc, October 29, 2012, cover price $49.95 | About this edition: In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations.

This book proposes a Throughput Model that draws from computer science, economic and psychology literatures to model perceptual and judgmental processes whereby biometrics might be used to reduce risks to a company's internal control. The book also discusses challenges in employing biometric technology and pinpoints avenues for future research. Biometrics is the examination of measurable biological characteristics. In organizational security, biometrics refers to tools that rely on measurable physical and behavioral characteristics that can be automatically checked. The Throughput Modeling process enables organizations to employ trust systems in assisting transactions that are motivated by ethical considerations. Auditing systems are by far based on trust. Concepts of ethics and trust are aided by the employment of biometrics technology, which enhances the transactions between individuals and organizations in an internal control environment. Issues pertaining to sustainability are also examined with the assistance of the Throughput Model. Finally, this book examines the potential use of an internal control biometrics system to lessen threats to identification and verification procedures. This book proposes an “Throughput Model framework” that considers both exposure and information risks as fundamental factors in classifying applications and organizational processes that might be candidates for the type of internal control biometrics system that biometrics can offer.

Hardcover:

9781617356544 | Information Age Pub Inc, December 15, 2011, cover price $85.99

Paperback:

9781617356537 | Information Age Pub Inc, December 15, 2011, cover price $45.99 | About this edition: This book proposes a Throughput Model that draws from computer science, economic and psychology literatures to model perceptual and judgmental processes whereby biometrics might be used to reduce risks to a company's internal control.

cover image for 9781420085907
Product Description: With most services and products now being offered through digital communications, new challenges have emerged for information security specialists. A Multidisciplinary Introduction to Information Security presents a range of topics on the security, privacy, and safety of information and communication technology...read more
By Stig F. Mjolsnes (editor)

Hardcover:

9781420085907 | Chapman & Hall, November 9, 2011, cover price $100.95 | About this edition: With most services and products now being offered through digital communications, new challenges have emerged for information security specialists.

cover image for 9780833052353
Product Description: Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA)‹which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e...read more

Paperback:

9780833052353 | Rand Corp, July 16, 2011, cover price $24.50 | About this edition: Passwords are proving less and less capable of protecting computer systems from abuse.

cover image for 9781593272883
Product Description: The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users...read more

Paperback:

9781593272883 | No Starch Pr, July 22, 2011, cover price $49.95 | About this edition: The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

cover image for 9781607507130
Product Description: Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise...read more
By Veronique Cortier (editor) and Steve Kremer (editor)

Hardcover:

9781607507130 | Ios Pr Inc, April 15, 2011, cover price $152.00 | About this edition: Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones.

cover image for 9781587059162
Product Description: The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI   Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details    PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated...read more

Paperback:

9781587059162, titled "PKI Uncovered: Certificate-based Security Solutions for Next-generation Networks" | 1 edition (Cisco Systems, February 18, 2011), cover price $65.00 | About this edition: The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI   Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details    PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated.

cover image for 9781586488741
Product Description: “The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever...read more

Hardcover:

9781586488741, titled "The Net Delusion: The Dark Side of Internet Freedom" | Public Affairs, January 4, 2011, cover price $27.95 | also contains The Dotcom Doctrine: Making the World Less Safe for Democracy, The Net Delusion: The Dark Side of Internet Freedom | About this edition: “The revolution will be Twittered!

cover image for 9781586488741
Product Description: “The revolution will be Twittered!” declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever...read more

Hardcover:

9781586488741, titled "The Net Delusion: The Dark Side of Internet Freedom" | Public Affairs, January 4, 2011, cover price $27.95 | also contains The Dotcom Doctrine: Promoting Democracy in the Digital Era, The Net Delusion: The Dark Side of Internet Freedom | About this edition: “The revolution will be Twittered!

n/a

Paperback:

9781449643959 | Lab manual edition (Jones & Bartlett Learning Itt, October 20, 2011), cover price $10.00
9781449612351 | Lab manual edition (Jones & Bartlett Learning Itt, December 20, 2010), cover price $10.00 | About this edition: n/a
9780763791285 | Jones & Bartlett Pub, September 30, 2010, cover price $101.95 | About this edition: PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES!

cover image for 9780071701099
Product Description: Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts...read more

Paperback:

9780071701099 | McGraw-Hill Osborne Media, October 25, 2010, cover price $69.00 | About this edition: Implement a robust SIEM system Effectively manage the security information and events produced by your network with help from this authoritative guide.

cover image for 9781461426424
Product Description: Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions. Applications of cryptographic access control will benefit companies, governments and the military where structured access to information is essential...read more

Hardcover:

9781441966544 | Springer-Verlag New York Inc, August 10, 2010, cover price $139.00
9780195170917, titled "The Oxford Encyclopedia of Economic History" | Oxford Univ Pr, June 1, 2003, cover price $55.01 | also contains The Oxford Encyclopedia of Economic History | About this edition: 'While many dictionaries of economics are available for purchase, this title is unique because of its greater depth of treatment.

Paperback:

9781461426424 | Springer-Verlag New York Inc, October 13, 2012, cover price $139.00 | About this edition: Cryptographic access control (CAC) is an approach to securing data by encrypting it with a key, so that only the users in possession of the correct key are able to decrypt the data and/or perform further encryptions.

cover image for 9783642126772
Product Description: Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements...read more
By Daniel J. Bernstein (editor) and Tanja Lange (editor)

Paperback:

9783642126772 | Springer-Verlag New York Inc, June 4, 2010, cover price $129.00 | About this edition: Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa.

cover image for 9780738433219

Paperback:

9780738433219 | Vervante, August 13, 2009, cover price $37.50
9780738432953 | Vervante, June 12, 2009, cover price $68.75

at beginning | displaying 1 to 25 | next 6 >