Book Finder
    
 
> Computers & Internet > Web Design & Development > Security & Encryption
 

Secrets and Lies: Digital Security in a Networked World
Bruce Schneier
0471453803
January 2004
Paperback
·
 
Book Review
Whom can you trust? Try Bruce Schneier, whose rare gift for common sense makes his book Secrets and Lies: Digital Security in a Networked World both enlightening and practical. He's worked in cryptography and electronic security for years, and has reached the depressing conclusion that even the loveliest code and toughest hardware still will yield to attackers who exploit human weaknesses in the users. The book is neatly divided into three parts, covering the turn-of-the-century landscape of systems and threats, the technologies used to protect and intercept data, and strategies for proper implementation of security systems. Moving away from blind faith in prevention, Schneier advocates swift detection and response to an attack, while maintaining firewalls and other gateways to keep out the amateurs.

Newcomers...



How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
Mike Andrews
0321369440
February 2006
Paperback
·
 
From the Back Cover
"The techniques in this book are not an option for testers–they are mandatory and these are the guys to tell you how to apply them!"–HarryRobinson, Google.   Rigorously test and improve the security of all your Web software!   It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software.   In this book, two renowned experts address every category of Web software exploit: attacks on clients, servers, state, user inputs, and more. You’ll master powerful attack tools and techniques as you uncover dozens...


Careers in E-Commerce
Chris Hayhurst
0823934209
Jan 2001
Hardcover
·
 


CISSP Certification All-in-One Exam Guide, Third Edition
Shon Harris
0072257121
August 2005
Hardcover
·
 
Book Description
The Third Edition of this proven All-in-One exam guide provides total coverage of the CISSP certification exam, which has again been voted one of the Top 10 IT certifications in 2005 by CertCities. Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.

From the Back Cover

Prepare to pass…the CISSP...



Freeware Encryption and Security Programs
Michael Chesbro
1581602707
Sept 2001
Paperback
·
 
Book Description
We are fast approaching a time when all our private communications will be monitored as a matter of course - just in case we might have some criminal intent, politically incorrect thought or uncommon belief. The files we store on our home or work computers and the messages we send over the Internet are fair game for those who would snoop into and record our private lives. The only way most of us can reclaim a modicum of privacy is through file encryption and security programs designed to keep prying eyes away from our secrets. Fortunately, there are many programs that are not only incredibly effective in guarding our privacy but are available absolutely free of charge. In this book, Michael Chesbro (The Complete Guide to E-Security, Privacy for Sale) outlines some of the most popular freeware encryption and security...


Microsoft Windows Server 2003 PKI and Certificate Security
Brian Komar
0735620210
June 2004
Paperback
·
 
Book Description
Presents the details of designing and implementing certificate-based security solutions for PKI-enabled applications. Softcover.

About the Author
Brian Komar is a principal consultant for Microsoft Corporation, specializing in network security and public key infrastructure (PKI). Brian has authored MCSE Training Kits, Microsoft Prescriptive Architecture Guides, and PKI white papers, and he is the coauthor of the Microsoft Windows Security Resource Kit. Brian is a frequent speaker at IT conferences such as Microsoft TechEd, MCP TechMentor, and Windows and .NET Magazine Connections. David Cross, Microsoft’s PKI program manager is a contributing author to this book.


Cryptography and Network Security
William Stallings
0131873164
November 2005
Hardcover
·
 
Book Description
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious...


Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Jothy Rosenberg
0672326515
March 2004
Paperback
·
 
Book Description
Helps take Web services securely to production, with insight into the latest security standards. Softcover.

Download Description
The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security. Comprehensive coverage and practical examples of the industry standards XML Signature and XML Encryption, and the first book to cover the final WS-Security and SAML 1.1 specifications Authors Jothy Rosenberg and David Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority and currently work for Service Integrity and BEA Systems, respectively. According to IBM, American Express, Sun Microsystems, and other industry leaders, well-defined security...


Hacking: The Art of Exploitation
Jon Erickson
1593270070
October 2003
Paperback
·
 
About.com, November 2003
"This is an excellent book."

Security Forums, January 2004
"the seminal hackers handbook"

See all Editorial Reviews


Practical Cryptography
Niels Ferguson
0471223573
April 2003
Paperback
·
 
Book Description
Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for...


Privacy on the Line: The Politics of Wiretapping and Encryption
Whitfield Diffie
0262541009
February 1999
Paperback
·
 
Book Review
There was a time when cryptography--the making and breaking of secret codes--was of interest only to spies, diplomats, and the occasional eccentric. Those days are over, and the reason, as Diffie and Landau explain, is that secret codes have become the key to preserving traditional notions of privacy at a time when technology is rapidly altering the nature of human communication.

When the vast majority of conversations happened face to face, keeping them private was a simple matter of stepping away from the listening crowd. But the growing number of conversations that take place over easy-to-intercept phone lines and e-mail channels requires more sophisticated safeguards. Above all, it requires online encryption tools of the highest grade, and this book does a good job of explaining how these tools work, both in principle...



Effective Oracle Database 10g Security by Design
David Knox
0072231300
May 2004
Paperback
·
 
Book Description
Oracle security expert David Knox explains how to design and develop an integrated, secure Oracle environment. In my experience in the security world, including 32 years at the Central Intelligence Agency, I've not found anyone with more experience in the theory and practice of protecting your data than David Knox. --Dave Carey, former Executive Director of the CIA

From the Back Cover

Protect Your Mission-Critical Data with Tips and Tricks from an Oracle Security Insider

Oracle expert David Knox has written the most practical, up-to-date book on Oracle Database 10g security available. With an emphasis on real-world problems and detailed solutions, Effective Oracle Database 10g Security by Design provides all the information you need to develop and...


  ©BookFinder USA LLC.
  All rights reserved.