Directory > Business > Publishing and Printing > Publishing > Books > Business > O'Reilly and Associates > Technical Books > Security Database Nation: The Death of Privacy in the 21st Century More than simply a journalistic summary of the current state of privacy rights and violations. It is a call to arms. Forty years ago, unbridled technology attacked our environment -- and few people seemed to know or care. Today, our environment still imperils us, but things are better than they might have been, and we have a population that's informed and, in many cases, activist. This book pleads the case for privacy in the same way. There is much that can be done with, not in spite of, technology. An aware public is the first step. http://www.oreilly.com/catalog/dbnation/ Reviews Rating: Not yet Rated
Whois Check
Incident Response Shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Includes both the technical and administrative aspects of building an effective incident response plan. http://www.oreilly.com/catalog/incidentres/ Reviews Rating: Not yet Rated
Whois Check
Web Security & Commerce Covers browser vulnerabilities, privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins, digital certificates, cryptography, Web server security, blocking software, censorship technology, and relevant civil and criminal issues. http://www.oreilly.com/catalog/websec/ Reviews Rating: Not yet Rated
Whois Check
Stopping Spam This book describes spam -- unwanted email messages and inappropriate news articles -- and explains what you and your Internet service providers and administrators can do to prevent it, trace it, stop it, and even outlaw it. http://www.oreilly.com/catalog/spam/ Reviews Rating: Not yet Rated
Whois Check
Practical UNIX & Internet Security Coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. http://www.oreilly.com/catalog/puis/ Reviews Rating: Not yet Rated
Whois Check
PGP: Pretty Good Privacy This book is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy. http://www.oreilly.com/catalog/pgp/ Reviews Rating: Not yet Rated
Whois Check
Oracle Security Describes basic RDBMS security features and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle Enterprise Manager and Oracle Security Server. http://www.oreilly.com/catalog/orasec/ Reviews Rating: Not yet Rated
Whois Check
Cracking DES The Data Encryption Standard withstood the test of time for twenty years. Cracking DES shows exactly how it was brought down. Every cryptographer, security designer, and student of cryptography policy should read this book to understand how the world changed as it fell. http://www.oreilly.com/catalog/crackdes/ Reviews Rating: Not yet Rated
Whois Check
Computer Security Basics Describes complicated concepts like trusted systems, encryption, and mandatory access control in simple terms. http://www.oreilly.com/catalog/csb/ Reviews Rating: Not yet Rated
Whois Check
Building Internet Firewalls, 2nd Edition Detailed guide that provides step-by-step explanations of how to design and install firewalls and to configure Internet services to work with a firewall. http://www.oreilly.com/catalog/fire2/ Reviews Rating: Not yet Rated
Whois Check
Malicious Mobile Code : Virus Protection for Windows "Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Reveals what such code can and can't do and how to recognize, remove, and prevent it. http://www.oreilly.com/catalog/malmobcode/ Reviews Rating: Not yet Rated
Whois Check
|