0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (192)
  • R250 - R500 (595)
  • R500+ (5,134)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback): Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager,... XSS Attacks - Cross Site Scripting Exploits and Defense (Paperback)
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D Petkov
R1,912 Discovery Miles 19 120 Ships in 18 - 22 working days

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to remote access, sensitive data theft, and monetary losses. Finally, the book closes by examining the ways developers can avoid XSS vulnerabilities in their web applications, and how users can avoid becoming a victim. The audience is web developers, security practitioners, and managers.
* XSS Vulnerabilities exist in 8 out of 10 Web sites
* The authors of this book are the undisputed industry leading authorities
* Contains independent, bleeding edge research, code listings and exploits that can not be found anywhere else

Security in Wireless LANs and MANs (Hardcover): Thomas Hardjono, Lakshminath R. Dondeti Security in Wireless LANs and MANs (Hardcover)
Thomas Hardjono, Lakshminath R. Dondeti
R2,511 Discovery Miles 25 110 Ships in 18 - 22 working days

With the popularity of the Wireless Local Area Network (WLAN) standard 802.11 WiFi and the growing interest in the next generation Wireless Metropolitan Area Network (WMAN) standard 802.16 WiMax, the need for effective solutions to the inherent security weaknesses of these networking technologies has become of critical importance. Thoroughly explaining the risks associated with deploying WLAN and WMAN networks, this groundbreaking book offers professionals practical insight into identifying and overcoming these security issues. Including detailed descriptions of possible solutions to a number of specific security problems, the book gives practitioners the hands-on techniques that they need to secure wireless networks in the enterprise and the home.

Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.): Jan-Frederik Kremer, Benedikt... Cyberspace and International Relations - Theory, Prospects and Challenges (Hardcover, 2014 ed.)
Jan-Frederik Kremer, Benedikt Muller
R4,056 Discovery Miles 40 560 Ships in 10 - 15 working days

Cyberspace is everywhere in today s world and has significant implications not only for global economic activity, but also for international politics and transnational social relations. This compilation addresses for the first time the cyberization of international relations - the growing dependence of actors in IR on the infrastructure and instruments of the internet, and the penetration of cyberspace into all fields of their activities. The volume approaches this topical issue in a comprehensive and interdisciplinary fashion, bringing together scholars from disciplines such as IR, security studies, ICT studies and philosophy as well as experts from everyday cyber-practice.

In the first part, concepts and theories are presented to shed light on the relationship between cyberspace and international relations, discussing implications for the discipline and presenting fresh and innovative theoretical approaches.

Contributions in the second part focus on specific empirical fields of activity (security, economy, diplomacy, cultural activity, transnational communication, critical infrastructure, cyber espionage, social media, and more) and address emerging challenges and prospects for international politics and relations."

Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015): Sherali Zeadally,... Privacy in a Digital, Networked World - Technologies, Implications and Solutions (Hardcover, 1st ed. 2015)
Sherali Zeadally, Mohamad Badra
R2,411 Discovery Miles 24 110 Ships in 10 - 15 working days

This comprehensive textbook/reference presents a focused review of the state of the art in privacy research, encompassing a range of diverse topics. The first book of its kind designed specifically to cater to courses on privacy, this authoritative volume provides technical, legal, and ethical perspectives on privacy issues from a global selection of renowned experts. Features: examines privacy issues relating to databases, P2P networks, big data technologies, social networks, and digital information networks; describes the challenges of addressing privacy concerns in various areas; reviews topics of privacy in electronic health systems, smart grid technology, vehicular ad-hoc networks, mobile devices, location-based systems, and crowdsourcing platforms; investigates approaches for protecting privacy in cloud applications; discusses the regulation of personal information disclosure and the privacy of individuals; presents the tools and the evidence to better understand consumers' privacy behaviors.

Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition): Edward Amoroso Cyber Attacks - Protecting National Infrastructure, STUDENT EDITION (Hardcover, Student Edition)
Edward Amoroso
R1,461 Discovery Miles 14 610 Ships in 10 - 15 working days

This textbook offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure and includes practical and empirically-based guidance for students wishing to become security engineers, network operators, software designers, technology managers, application developers, Chief Security Officers, etc.. This approach includes controversial themes such as the deliberate use of deception to trap intruders. In short, it serves as an attractive framework for a new national strategy for cyber security. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows students to understand how any organization, such as a government agency, integrates the principles into their local environment. The STUDENT EDITION features several case studies illustrating actual implementation scenarios of the principals and requirements discussed in the text. It also includes helpful pedagogical elements such as chapter outlines, chapter summaries, learning checklists, and a 2-color interior. And it boasts a new and complete instructor ancillary package including test bank, IM, Ppt slides, case study questions, and more.

Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges

Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues

Includes instructor slides for each chapter as well as an instructor s manual with sample syllabi and test bank"

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016): James J... Advances in Parallel and Distributed Computing and Ubiquitous Services - UCAWSN & PDCAT 2015 (Hardcover, 1st ed. 2016)
James J (Jong Hyuk) Park, Gangman Yi, Young-Sik Jeong, Hong Shen
R3,615 R3,354 Discovery Miles 33 540 Save R261 (7%) Ships in 10 - 15 working days

This book contains the combined proceedings of the 4th International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-15) and the 16th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT-15). The combined proceedings present peer-reviewed contributions from academic and industrial researchers in fields including ubiquitous and context-aware computing, context-awareness reasoning and representation, location awareness services, and architectures, protocols and algorithms, energy, management and control of wireless sensor networks. The book includes the latest research results, practical developments and applications in parallel/distributed architectures, wireless networks and mobile computing, formal methods and programming languages, network routing and communication algorithms, database applications and data mining, access control and authorization and privacy preserving computation.

The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover): Christian Espinosa The Smartest Person in the Room - The Root Cause and New Solution for Cybersecurity (Hardcover)
Christian Espinosa
R668 Discovery Miles 6 680 Ships in 10 - 15 working days
Coding for Penetration Testers - Building Better Tools (Paperback): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback)
Jason Andress, Ryan Linn
R804 R647 Discovery Miles 6 470 Save R157 (20%) Ships in 10 - 15 working days

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. "Coding for Penetration Testers" provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit.
Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting

AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback): Santana AWS Certified Security Study Guide - Specialty (SCS-C01) Exam (Paperback)
Santana
R1,371 R1,149 Discovery Miles 11 490 Save R222 (16%) Ships in 18 - 22 working days

Get prepared for the AWS Certified Security Specialty certification with this excellent resource By earning the AWS Certified Security Specialty certification, IT professionals can gain valuable recognition as cloud security experts. The AWS Certified Security Study Guide: Specialty (SCS-C01) Exam helps cloud security practitioners prepare for success on the certification exam. It's also an excellent reference for professionals, covering security best practices and the implementation of security features for clients or employers. Architects and engineers with knowledge of cloud computing architectures will find significant value in this book, which offers guidance on primary security threats and defense principles. Amazon Web Services security controls and tools are explained through real-world scenarios. These examples demonstrate how professionals can design, build, and operate secure cloud environments that run modern applications. The study guide serves as a primary source for those who are ready to apply their skills and seek certification. It addresses how cybersecurity can be improved using the AWS cloud and its native security services. Readers will benefit from detailed coverage of AWS Certified Security Specialty Exam topics. Covers all AWS Certified Security Specialty exam topics Explains AWS cybersecurity techniques and incident response Covers logging and monitoring using the Amazon cloud Examines infrastructure security Describes access management and data protection With a single study resource, you can learn how to enhance security through the automation, troubleshooting, and development integration capabilities available with cloud computing. You will also discover services and tools to develop security plans that work in sync with cloud adoption.

Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.): Robinson E. Pino, Alexander Kott, Michael... Cybersecurity Systems for Human Cognition Augmentation (Hardcover, 2014 ed.)
Robinson E. Pino, Alexander Kott, Michael Shevenell
R3,877 R3,324 Discovery Miles 33 240 Save R553 (14%) Ships in 10 - 15 working days

This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience. The contributing authors, who are renowned leaders in this field, thoroughly examine new technologies that will automate security procedures and perform autonomous functions with decision making capabilities. To maximize reader insight into the range of professions dealing with increased cybersecurity issues, this book presents work performed by government, industry, and academic research institutions working at the frontier of cybersecurity and network sciences. Cybersecurity Systems for Human Cognition Augmentation is designed as a reference for practitioners or government employees working in cybersecurity. Advanced-level students or researchers focused on computer engineering or neuroscience will also find this book a useful resource.

Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New): Sajal K. Das, Krishna Kant, Nan Zhang Handbook on Securing Cyber-Physical Critical Infrastructure (Hardcover, New)
Sajal K. Das, Krishna Kant, Nan Zhang
R1,916 Discovery Miles 19 160 Ships in 10 - 15 working days

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R699 R628 Discovery Miles 6 280 Save R71 (10%) Ships in 18 - 22 working days
Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019): Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal,... Big Data Processing Using Spark in Cloud (Hardcover, 1st ed. 2019)
Mamta Mittal, Valentina E. Balas, Lalit Mohan Goyal, Raghvendra Kumar
R2,677 Discovery Miles 26 770 Ships in 18 - 22 working days

The book describes the emergence of big data technologies and the role of Spark in the entire big data stack. It compares Spark and Hadoop and identifies the shortcomings of Hadoop that have been overcome by Spark. The book mainly focuses on the in-depth architecture of Spark and our understanding of Spark RDDs and how RDD complements big data's immutable nature, and solves it with lazy evaluation, cacheable and type inference. It also addresses advanced topics in Spark, starting with the basics of Scala and the core Spark framework, and exploring Spark data frames, machine learning using Mllib, graph analytics using Graph X and real-time processing with Apache Kafka, AWS Kenisis, and Azure Event Hub. It then goes on to investigate Spark using PySpark and R. Focusing on the current big data stack, the book examines the interaction with current big data tools, with Spark being the core processing layer for all types of data. The book is intended for data engineers and scientists working on massive datasets and big data technologies in the cloud. In addition to industry professionals, it is helpful for aspiring data processing professionals and students working in big data processing and cloud computing environments.

Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover): Sunita Vikrant Dhavale Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention (Hardcover)
Sunita Vikrant Dhavale
R5,453 Discovery Miles 54 530 Ships in 18 - 22 working days

In recent decades there has been incredible growth in the use of various internet applications by individuals and organizations who store sensitive information online on different servers. This greater reliance of organizations and individuals on internet technologies and applications increases the threat space and poses several challenges for implementing and maintaining cybersecurity practices. Constructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention provides innovative insights into how an ethical hacking knowledge base can be used for testing and improving the network and system security posture of an organization. It is critical for each individual and institute to learn hacking tools and techniques that are used by dangerous hackers in tandem with forming a team of ethical hacking professionals to test their systems effectively. Highlighting topics including cyber operations, server security, and network statistics, this publication is designed for technical experts, students, academicians, government officials, and industry professionals.

Introduction to Security Reduction (Hardcover, 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Hardcover, 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,891 Discovery Miles 48 910 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Cyber Attacks - Protecting National Infrastructure (Hardcover): Edward Amoroso Cyber Attacks - Protecting National Infrastructure (Hardcover)
Edward Amoroso
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

No nation - especially the United States - has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Hardcover, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R4,027 R3,496 Discovery Miles 34 960 Save R531 (13%) Ships in 10 - 15 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests.

"Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."

Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015): George S. Oreku, Tamara Pazynyuk Security in Wireless Sensor Networks (Hardcover, 1st ed. 2015)
George S. Oreku, Tamara Pazynyuk
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to the topic and give numerous practical examples as well as case studies to illustrate the theory. The target audience primarily comprises experts and practitioners in the field of sensor network security, but the book may also be beneficial for researchers in academia as well as for graduate students.

Economics of Information Security and Privacy III (Hardcover, 2012): Bruce Schneier Economics of Information Security and Privacy III (Hardcover, 2012)
Bruce Schneier
R4,688 Discovery Miles 46 880 Ships in 10 - 15 working days

The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary scholarship on information security, combining expertise from the fields of economics, social science, business, law, policy and computer science. Prior workshops have explored the role of incentives between attackers and defenders, identified market failures dogging Internet security, and assessed investments in cyber-defense. Current contributions build on past efforts using empirical and analytic tools to not only understand threats, but also strengthen security through novel evaluations of available solutions. "Economics of Information Security and Privacy III" addresses the following questions: how should information risk be modeled given the constraints of rare incidence and high interdependence; how do individuals' and organizations' perceptions of privacy and security color their decision making; how can we move towards a more secure information infrastructure and code base while accounting for the incentives of stakeholders?

Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover): Alex Chi Keung Ng Contemporary Identity and Access Management Architectures - Emerging Research and Opportunities (Hardcover)
Alex Chi Keung Ng
R4,340 Discovery Miles 43 400 Ships in 18 - 22 working days

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization's identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Microsoft Log Parser Toolkit - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool (Paperback): Gabriele... Microsoft Log Parser Toolkit - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool (Paperback)
Gabriele Giuseppini, Mark Burnett
R1,324 Discovery Miles 13 240 Ships in 10 - 15 working days

HIGHLIGHT
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.
System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This book will teach administrators how to use Microsoft's Log Parser to data mine all of the information available within these countless logs. The book teaches readers how all queries within Log Parser work (for example: a Log Parser query to an Exchange log may provide information on the origin of spam, viruses, etc.). Also, Log Parser is completely scriptable and customizable so the book and accompanying Web site will provide the reader with hundreds of original, working scripts that will automate these tasks and provide formatted charts and reports detailing the results of the queries.
* Written by Microsoft's sole developer of Log Parser, this is the first book available on the powerful yet completely undocumented product that ships with Microsoft's IIS, Windows Advanced Server 2003, and is available as a free download from the
Microsoft Web site.
* The book and accompanying Web site contain dozens of original, working Log Parser scripts and templates for Windows Server, ISA Server, Snort IDS, Exchange Server, IIS, and more
* This book and accompanying scripts will save system administrators countless hours by scripting and automating the most common to the most complex log analysis tasks.

Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover): Shadi Aljawarneh, Manisha... Critical Research on Scalability and Security Issues in Virtual Cloud Environments (Hardcover)
Shadi Aljawarneh, Manisha Malhotra
R5,555 Discovery Miles 55 550 Ships in 18 - 22 working days

Individual users and business organizations are shifting their data storage and utilizing cloud computing because of its easy availability and reduced costs. Although, this technology is creating an easy way to store, share, and access data, serious security concerns have been generated. Critical Research on Scalability and Security Issues in Virtual Cloud Environments is a critical scholarly resource that examines the concept of cloud computing and explores the various shortcomings of using the cloud. Featuring coverage on a broad range of topics such as cloud architecture for scalability, data vulnerability, and server virtualization management, this book is geared towards academicians, practitioners, and researchers seeking current research on developing effective security measures for cloud paradigm.

.NET Mobile Web Developers Guide (Paperback): Syngress .NET Mobile Web Developers Guide (Paperback)
Syngress
R1,378 Discovery Miles 13 780 Ships in 10 - 15 working days

Introducing Microsoft's flagship wireless development tool
The .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies. The focus of this book is on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform and goes into moderate details on ASP.NET to allow readers to start developing ASP.NET applications. In addition, this book will give the readers the insight to use the various Microsoft technologies for developing mobile applications.
This book assumes the readers have experience in developing web applications and are familiar with any one of the server-side technologies like ASP, JSP or PHP.
The first book available on Microsoft's cornerstone wireless development tool
Best selling, high profile authors. Wei Meng Lee and Shelley Powers are frequent speakers at all of the major developer conferences have previously authored best selling books for O'Reilly & Associates, Wrox Press, SAMS and Que
Comes with wallet-sized CD containing a printable HTML version of the book, all of the source code examples and demos of popular ASP .NET and .NET Mobile programming tools
Comprehensive Coverage of the .NET Mobile SDK and ASP.NET for Mobile Web developers

IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018): Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek IT Convergence and Security 2017 - Volume 1 (Hardcover, 1st ed. 2018)
Kuinam J. Kim, Hyuncheol Kim, Nakhoon Baek
R6,061 Discovery Miles 60 610 Ships in 18 - 22 working days

This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field. It explores how IT convergence and security issues are core to most current research, and industrial and commercial activities. It consists of contributions covering topics such as machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics. ICITCS 2017 is the latest in a series of highly successful International Conferences on IT Convergence and Security, previously held in Prague, Czech Republic(2016), Kuala Lumpur, Malaysia (2015) Beijing, China (2014), Macau, China (2013), Pyeong Chang, Korea (2012), and Suwon, Korea (2011).

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Handbook of Research on Technical…
Amit Kumar Tyagi Hardcover R8,044 Discovery Miles 80 440
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Investigations and the Art of the…
Inge Sebyan Black, Lawrence Fennelly Paperback R1,661 Discovery Miles 16 610
Hacking - Computer Hacking for…
Adam Dodson Hardcover R546 R500 Discovery Miles 5 000

 

Partners