58aef6429c1e4.jpeg
PDF
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams. This two-in-one Study Guide provides: In-depth coverage of all exam topics Practical information on implementing Cisco's Secure PIX and Secure VPN technologies Hundreds of challenging review questions Leading-edge exam preparation software, including a test engine and electronic flashcards Authoritative coverage of all exam objec...

58aef6415cb35.jpeg
PDF
Applied Cryptography. Protocols, Algorithms and Source Code in C

This book provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography - the technique of enciphering and deciphering messages – to maintain the privacy of computer data. The boob describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to s...

58ac29b26e2c7.jpeg
PDF
Desktop Witness: The Do's and Don'ts of Personal Computer Security

Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive? If not - read this. This book describes the ways in which computer and online privacy can be compromised and gives practical guidance on how to prevent private information from being accessible or retrievable by outside parties or agencies. This book cover...

58ac1f63d5410.jpeg
PDF
Statistical Methods in Computer Security

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may preven...

58ac1f60e32f3.jpeg
PDF
SAP Security and Risk Management, 2nd edition

The revised and expanded second edition of this best-selling book describes all requirements, basic principles, and best practices of security for an SAP system. You’ll learn how to protect each SAP component internally and externally while also complying with legal requirements; furthermore, you’ll learn how to master the interaction of these requirements to provide a holistic security and risk management solution. Using numerous ex...

58aba7ce59004.jpeg
PDF
Multicast and Group Security

A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security issues relating to other group communication technologies. Algorithms and protocols for multi-party secure communication are included. T...

58aba7cce9a6c.jpeg
PDF
Practical Aspects of Rape Investigation

U.S. Justice Department statistics indicate that only 26 percent of all rapes or attempted rapes are reported to law enforcement officials, and only slightly more than half of these result in the arrest of a suspect. Part of the problem lies in the public’s lack of faith in the criminal justice system’s ability to effectively deal with rape, victims, and the offenders. Practical Aspects of Rape Investigation: A Multidisciplinary Appr...

58aa903280847.jpeg
PDF
Reforming International Environmental Governance

More than 500 international agreements and institutions now influence the governance of environmental problems ranging from climate change to persistent organic pollutants. The establishment of environmental institutions has been largely ad hoc, diffused, and somewhat chaotic, because the international community has addressed key challenges as they have risen. The World Summit on Sustainable Development in Johannesburg in 2002 unders...

58a9a2253f7e9.jpeg
PDF
Wireshark Network Security

A succinct guide to securely administer your network using Wireshark About This Book Make the most of Wireshark by breezing through all its features and analyzing network security threats Full of scenarios faced by security analysts along with comprehensive solutions Packed with step-by-step instructions to walk you through the capabilities of Wireshark Who This Book Is For If you are network administrator or a security analyst with ...

58a9985cb0074.jpeg
PDF
Gangs (Straight Talk About...(Crabtree))

Gangs exist in places all over the world. The United States, however, is believed to have more gangs than any other country in the world. This book provides a comprehensive overview of the issues surrounding gangs, including how and why young people are lured into gangs and the consequences of gang involvement. Firsthand accounts and current statistics provide an insightful look at this issue.