Top >
1. |
Malicious Mobile Code : Virus Protection for Windows
|
|
is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Reveals what such code can and can't do and how to recognize, remove, and prevent it.
Date Added: Jul 19, 2006 Hits:
|
|
2. |
Building Internet Firewalls, 2nd Edition
|
|
Detailed guide that provides step-by-step explanations of how to design and install firewalls and to configure Internet services to work with a firewall.
Date Added: Jul 19, 2006 Hits:
|
|
3. |
Computer Security Basics
|
|
Describes complicated concepts like trusted systems, encryption, and mandatory access control in simple terms.
Date Added: Jul 19, 2006 Hits:
|
|
4. |
Cracking DES
|
|
The Data Encryption Standard withstood the test of time for twenty years. Cracking DES shows exactly how it was brought down. Every cryptographer, security designer, and student of cryptography policy should read this book to understand how the world changed as it fell.
Date Added: Jul 19, 2006 Hits:
|
|
5. |
Oracle Security
|
|
Describes basic RDBMS security features and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle Enterprise Manager and Oracle Security Server.
Date Added: Jul 19, 2006 Hits:
|
|
6. |
PGP: Pretty Good Privacy
|
|
This book is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy.
Date Added: Jul 19, 2006 Hits:
|
|
7. |
Internet Security
|
|
Coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others.
Date Added: Jul 19, 2006 Hits:
|
|
8. |
Stopping Spam
|
|
This book describes spam -- unwanted email messages and inappropriate news articles -- and explains what you and your Internet service providers and administrators can do to prevent it, trace it, stop it, and even outlaw it.
Date Added: Jul 19, 2006 Hits:
|
|
9. |
Commerce
|
|
Covers browser vulnerabilities, privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins, digital certificates, cryptography, Web server security, blocking software, censorship technology, and relevant civil and criminal issues.
Date Added: Jul 19, 2006 Hits:
|
|
10. |
Incident Response
|
|
Shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Includes both the technical and administrative aspects of building an effective incident response plan.
Date Added: Jul 19, 2006 Hits:
|
|
|
|