Login       My Wishlist
  My Cart
$0.00 / 0 items
Translate This Website
International Translation Network
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Certification   CompTIA

CompTIA - 981 - Page 3 - Blowout Sale! Save up to 73%

Blowout Sale! Up to 73% off on CompTIA at Translate This Website, Page 3. Top brands include O'Reilly Media, Brand: Sams Publishing, Brand: New Riders Publishing, Springer, Brand: Springer, Brand: Syngress, For Dummies, Garry Robinson, Brand: Wrox Press, Wiley, Pearson IT Certification, Adam Freeman Allen Jones, Addison-Wesley Professional, Brand: Addison-Wesley, & Brand: O'Reilly Media. Hurry! Limited time offers. Offers valid only while supplies last.

Security Warrior: Know Your Enemy
By O'Reilly Media
In Stock
You Save: 39%

ean: 9780596005450, isbn: 0596005458,

4.2 out of 5 stars with 208 reviews
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from

Securing Web Services with WS-Security: Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
By Brand: Sams Publishing
In Stock
You Save: 2%

mpn: illustrations, ean: 9780672326516, isbn: 9780672326516,

4.9 out of 5 stars with 131 reviews
Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.Used Book in Good Condition.

Writing Information Security Policies
By Brand: New Riders Publishing
In Stock
You Save: 65%

ean: 9781578702640, isbn: 157870264X,

4.9 out of 5 stars with 186 reviews
Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people for keeping the network secure, their efforts do not account for all assets and business requirements Finally, someone decides it is time to write a security policy. Management

Computer Safety, Reliability, and Security: 23rd International Conference, SAFECOMP 2004, Potsdam, Germany, September 21-24,2004, Proceedings (Lecture Notes in Computer Science)
By Springer
In Stock
You Save: 62%

mpn: Illustrations, ean: 9783540231769, isbn: 3540231765,

4.8 out of 5 stars with 138 reviews
Theimportanceofsafetyandsecurityisgrowingsteadily.Safetyisaqualityc- racteristic that traditionally has been considered to be important in embedded systems, and security is usually an essential property in business applications. There is certainly a tendency to use software-based solutions in safety-critical applications domains, which increases the importance of safety engineering te- niques. These include modelling and analysis techniques as well as appropriate processes and tools. And it is

Computer Safety, Reliability, and Security: 26th International Conference, SAFECOMP 2007, Nurmberg, Germany, September 18-21, 2007, Proceedings (Lecture Notes in Computer Science)
By Brand: Springer
In Stock
You Save: 34%

mpn: biography, ean: 9783540751007, isbn: 3540751009,

4.6 out of 5 stars with 73 reviews
This book constitutes the refereed proceedings of the 26th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2007. The 33 revised full papers and 16 short papers are organized in topical sections on safety cases, impact of security on safety, fault tree analysis, safety analysis, security aspects, verification and validation, platform reliability, reliability evaluation, formal methods, static code analysis, safety-related architectures.Used Book in Good

Computer Safety, Reliability, and Security : 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings (Lecture Notes in Computer Science)
By Springer
SKU: #9783540292005
In Stock
You Save: 26%

sku: 9783540292005, mpn: 1, ean: 9783540292005, isbn: 3540292004,

4.5 out of 5 stars with 273 reviews
This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2005, held in Fredrikstad, Norway, in September 2005. The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers address all aspects of dependability and survivability of critical computerized systems in various branches and infrastructures..

Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
By Brand: Syngress
In Stock
You Save: 11%

mpn: 1, ean: 9781597491730, isbn: 159749173X,

4.4 out of 5 stars with 108 reviews
I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may

CompTIA A+ Certification All-In-One Desk Reference For Dummies
By For Dummies
In Stock

ean: 9780471748113, isbn: 0471748110,

4.0 out of 5 stars with 78 reviews
At the end of 2004, more than 600,000 people had received CompTIA's vendor-neutral A+ certification, a key credential for anyone pursuing a career as a computer technician This competitively priced new guide offers seven minibooks and 1,000+ pages covering every aspect of the two required A+ exams, plus customizable test-prep software on CD-ROM Minibooks provide a thorough review of all the hardware and operating system topics tested in the exams: installation, configuration, and upgrading;

Real World Microsoft Access Database Protection and Security
By Garry Robinson
In Stock
You Save: 53%

ean: 9781590591260, isbn: 1590591267,

4.1 out of 5 stars with 65 reviews
Security issues for all versions of Access from 97 to 2003 are discussed and the merits of each security approach from both the perspective of the developer and the database administrator/manager are examined..

C# Data Security Handbook
By Brand: Wrox Press
SKU: #mon0001825999
In Stock

sku: mon0001825999, ean: 9781861008015, isbn: 1861008015,

4.5 out of 5 stars with 296 reviews
This book is aimed at practicing C# developers who are developing distributed applications or who need to store data in a secure manner. This book is aims to take C# developers with little or no knowledge of cryptography to the point where the can confidently implement their own secure applications. This will cover the basics of using symmetric and asymmetric cryptography in .NET then we'll go on to examine how to make practical use of these technologies in the following areas: Secure data

Web Security Sourcebook
By Wiley
In Stock
You Save: 63%

ean: 9780471181484, isbn: 047118148X,

4.6 out of 5 stars with 40 reviews
''The authors . . . bring wide-ranging experience to this work, moving from theory to hands-on, bit-shoveling practical advice.'' -Steven M. Bellovin A serious security sourcebook for Web professionals and users. The front door is unlocked and wide open. The alarm's not working and no one's home. All of your valuables, money, and intimate details of your life are just sitting inside, waiting to be taken. No, it's not your house . . . it's your computer. The Web now penetrates every aspect of

CompTIA A+ 220-801 and 220-802 Cert Guide, Deluxe Edition (3rd Edition)
By Pearson IT Certification
In Stock
You Save: 49%

mpn: illustrations, ean: 9780789749802, isbn: 0789749807,

4.2 out of 5 stars with 207 reviews
Learn, prepare, and practice for CompTIA A+ 220-801 and 220-802 exam success with this CompTIA Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Approved Platinum Partner. Master CompTIA A+ 220-801 and 220-802 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam-preparation tasks Practice with realistic exam questions on the DVD 4-color interior and additional Deluxe Edition bonus features More

Programming .Net Security
By Adam Freeman Allen Jones
In Stock
You Save: 73%

ean: 9780596004422, isbn: 0596004427,

4.5 out of 5 stars with 62 reviews
With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write

Open Internet Security: Von den Grundlagen zu den Anwendungen (Xpert.press) (German Edition)
By Brand: Springer
In Stock
You Save: 9%

ean: 9783540668145, isbn: 3540668144,

4.9 out of 5 stars with 251 reviews
Die Autoren stellen die Sicherheitsaspekte der Internet-Kommunikation verständlich dar. Dabei betrachten sie nicht nur die theoretischen Grundlagen verschiedener Sicherheitsstrategien, sondern erläutern auch die Risiken bei der Anwendung bzw. Implementierung. Die beschriebenen Sicherheitstools orientieren sich am Schichtenmodell der ISO/OSI, die Sicherheitsrelevanz der verschiedenen Schichten wird analysiert. Erläuterungen von Security-Aspekten bei der IP-Telefonie und beim Internet-Banking

SANS GIAC Certification: Security Essentials Toolkit (GSEC)
By Pearson IT Certification
In Stock

ean: 9780789727749, isbn: 0789727749,

4.8 out of 5 stars with 123 reviews
Master the tools of the network security trade with the official book from SANS Press! You need more than a hammer to build a house, and you need more than one tool to secure your network. Security Essentials Toolkit covers the critical tools that you need to secure your site, showing you why, when, and how to use them. Based on the SANS Institute's renowned Global Information Assurance Certification (GIAC) program, this book takes a workbook-style approach that gives you hands-on experience

The Art of Software Security Testing: Identifying Software Security Flaws
By Addison-Wesley Professional
In Stock
You Save: 19%

mpn: Illustrations, ean: 9780321304865, isbn: 0321304861,

4.7 out of 5 stars with 262 reviews
This book gives developers and testers everything they need to understand software security problems and find them before software is released and the damage is done. The authors open with an overview of the root security problem and how insecure design and implementation leaves software vulnerable to exploit. Next, the authors teach readers to create custom software debugging tools that test the unique aspects of a given program and explain how to analyze the results to determine which flaws

How to Break Software Security
By Brand: Addison-Wesley
In Stock

mpn: 9780321194336, ean: 9780321194336, isbn: 0321194330,

4.3 out of 5 stars with 82 reviews
How to Break Software Security describes the general problem of software security in a practical perspective from a software tester's point of view. It defines prescriptive techniques (attacks that testers can use on their own software) that are designed to ferret out security vulnerabilities in software applications. The book's style is easy to read and provides readers with the techniques and advice to hunt down security bugs and see that they're destroyed before the software is

Java Security (2nd Edition)
By Brand: O'Reilly Media
In Stock
You Save: 50%

ean: 9780596001575, isbn: 0596001576,

4.9 out of 5 stars with 18 reviews
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is the in-depth exploration you need.Java Security, 2nd Edition, focuses on the basic platform features of Java that provide security--the class loader,

Build Your Own Security Lab: A Field Guide for Network Testing
By Wiley
In Stock
You Save: 27%

ean: 9780470179864, isbn: 0470179864,

4.4 out of 5 stars with 179 reviews
If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future. Note: CD-ROM/DVD and other

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services. Book & CD
By Addison-Wesley Professional
In Stock
You Save: 46%

mpn: 9780321369444, ean: 9780321369444, isbn: 9780321369444,

4.7 out of 5 stars with 232 reviews
Rigorously test and improve the security of all your Web software!   It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software.   In this book, two renowned experts address every category of Web software exploit: attacks on

Viewing Page 3 of 4

View more products in Certification.
Feel free to Browse Our Catalog.

Privacy Policy / Terms of Service / Accessibility Statement
© 2020 - translateth.is. All Rights Reserved.