Use coupon NIKONEXTRA10 & get additional 10% discount on nikon cameras The new Samsung Galaxy Core 2 available at Rs. 11,899 Use coupon HDD400 for additional Rs.400 discount on HDDs Fujifilm Instax mini 8 Instant Camera at Lowest Price of Rs.5,399 Buy anything and everything under Rs.299
Showing 1-20 of 620

Books on Computers > Security

  • 1.  

    CISA Certified Information Systems Auditor All- in- One Exam Guide

     By Peter Gregory [Ebook, Adobe pdf 2011]
    Rs. 3,780 2,835 (25% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: "All-in-One is All You Need" The new edition of this trusted resource offers complete, up-to-date coverage of all the material included on the latest release of the Certified Information Systems Auditor exam. Written by an IT security and audit expert, CISA Certified Information Systems Auditor All-in-One Exam Guide, Second...   more
  • 2.  

    Essential PHP Security

     By Chris Shiflett [Ebook, Open epub]
    Rs. 1,511 1,209 (20% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! "PHP Web Application Security" helps readers build secure Web applications, using Apache and MySQL along with PHP 5. The book details the attacks that hackers use against Web sites, and shows how to correctly configure Apache and PHP to guard against them. Being highly flexible in building dynamic, database-driven web...   more
    Other Editions: Paperback 2005 Paperback 2005
  • 3.  

    Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

     By Joel Scambray [Ebook, Adobe pdf]
    Rs. 3,149 2,362 (25% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! About the Author Joel Scambray is Chief Strategy Officer for Leviathan Security Group, an information security consultancy located in Seattle and Denver. Table of Contents...   more
  • 4.  

    Hacking For Dummies

     By Kevin Beaver [Ebook, Adobe pdf 2009]
    Rs. 1,598 1,198 (25% OFF)
    Discontinued Develop a plan to keep your information safe Find out how to test your systems, plug the holes, and foil attackers You'll find out how external hacker and rogue insider hacks happen, how to discover where your systems and network are weak, what you can do to strengthen your defenses,...   more
  • 5.  

    Writing Information Security Policies

     By Scott Barman [Ebook, Adobe pdf 2001]
    Rs. 1,763 1,234 (30% OFF)
    Discontinued Description: Administrators, more technically savvy than their managers, have started to secure the networks in a way they see as appropriate. When management catches up to the notion that security is important, system administrators have already altered the goals and business practices. Although they may be grateful to these people...   more
    Other Editions: Paperback 2001
  • 6.  

    Emergency Notification

     By Robert C Chandler [Ebook, Adobe pdf 2010]
    Rs. 2,443 2,198 (10% OFF)
    Discontinued 9/11. Hurricane Katrina. The shootings at Columbine High School and Virginia Tech. The California wildfires of 2007. During an unfolding emergency - whether crime or terrorism, natural disaster, industrial accident, or workplace or campus violence - it is essential to know how to handle the situation and save lives. Unfortunately,...   more
    Other Editions: Hardcover 2010
  • 7.  

    Geometric Spanner Networks

     By Giri Narasimhan , Michiel Smid [Ebook, Adobe pdf]
    Rs. 6,426 5,783 (10% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: Aimed at an audience of researchers and graduate students in computational geometry and algorithm design, this book uses the Geometric Spanner Network Problem to showcase a number of useful algorithmic techniques, data structure strategies, and geometric analysis techniques with many applications, practical and theoretical. The authors present rigorous descriptions...   more
    Other Editions: Hardcover 2007
  • 8.  

    IT Auditing Using Controls to Protect Information Assets, 2nd Edition

     By Chris Davis , Mike Schiller , Kevin Wheeler [Ebook, Adobe epub]
    Rs. 4,410 3,308 (25% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and technologies, IT Auditing: Using Controls to Protect Information Assets, Second Edition , explains, step by step, how to implement a successful, enterprise-wide IT audit program. New chapters on auditing cloud computing, outsourced operations,...   more
    Other Editions: Paperback 2007
  • 9.  

    Cisco ASA Configuration

     By Richard Deal [Ebook, Adobe pdf]
    Rs. 3,906 2,930 (25% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! ? In-depth hands-on implementation examples throughout the book. ? Covers the latest features in version 8.0 and 8.1 ? Richard is a Cisco expert, Cisco instructor and the best-selling author of Cisco PIX Firewalls and several Cisco certification titles. Table of Contents: Part I: Introduction to ASA Security Appliances and...   more
  • 10.  

    Security Monitoring

     By Chris Fry , Martin Nystrom [Ebook, Open epub]
    Rs. 2,267 1,814 (20% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! How does your system stand up against today's sophisticated security threats, especially those involving data theft? With this book, security experts from Cisco Systems demonstrate how you can protect your network effectively -- first by determining which assets you need to monitor closely, and then developing targeted strategies and user...   more
    Other Editions: Paperback 2009 Paperback 2009
  • 11.  

    AVIEN Malware Defense Guide for the Enterprise

     By David Harley [Ebook, Adobe pdf]
    Rs. 3,966 3,490 (12% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN...   more
    Other Editions: Paperback 2007
  • 12.  

    Beginning ASP. NET Security

     By Barry Dorrans [Ebook, Adobe epub 2010]
    Rs. 2,995 2,846 (5% OFF)    Download Sample eBook
    Discontinued A practical guide to securing ASP.NET sites Beginning ASP.NET Security is for novice to intermediate ASP.NET programmers and provides a step-by-step solution to securing each area of ASP.NET development. Rather than approaching security from a theoretical direction, MVP Barry Dorrans shows you examples of how everyday code can be attacked,...   more
    Other Editions: Paperback 2010 Paperback 2010
  • 13.  

    Network Security Bible (Bible# 657)

     By Eric Cole [Ebook, Adobe pdf 2009]
    Rs. 3,994 2,996 (25% OFF)
    Discontinued Adobe PDF eBook Rights: Copy allowed for 15 selections within interval of 365 days Print allowed : Unlimited Read aloud not allowed. Description: The comprehensive A-to-Z guide on network security, fully revised and updated Network security is constantly evolving, and this comprehensive guide has been thoroughly updated to cover the...   more
    Other Editions: Paperback 2009
  • 14.  

    Advances in Computers: Information Security

     By Marvin Zelkowitz [Ebook, Adobe pdf]
    Rs. 11,655 10,490 (10% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of...   more
    Other Editions: Hardbound 2004
  • 15.  

    AspectJ Cookbook

     By Russ Miles [Ebook, Open epub]
    Rs. 2,267 1,814 (20% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: When Object Oriented programming (OO) first appeared, it was a revelation. OO gave developers the ability to create software that was more flexible and robust, but as time went on and applications became more sophisticated, too, certain areas of "traditional" OO architectures were found wanting. Aspect-oriented programming (AOP) addresses...   more
    Other Editions: Paperback 2005
  • 16.  

    Developers Guide to Web Application Security

     By Michael Cross [Ebook, Adobe pdf]
    Rs. 3,273 2,291 (30% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications. This book defines Web application security, why it should be addressed earlier in...   more
    Other Editions: Paperback 2007
  • 17.  

    Zen and the Art of Information Security

     By Ira Winkler [Ebook, Adobe pdf]
    Rs. 2,013 1,409 (30% OFF)    Download Now!
    In Stock. Delivers in 60 seconds! Description: While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype...   more
    Other Editions: Paperback 2007
  • 18.  

    Managing an Information Security and Privacy Awareness and Training Program

     By Rebecca Herold [Ebook, Adobe pdf 2005]
    Rs. 2,453 2,208 (10% OFF)
    Discontinued Managing an Information Security and Privacy Awareness and Training Program provides a starting point and an all-in-one resource for infosec and privacy education practitioners who are building programs for their organizations. The author applies knowledge obtained through her work in education, creating a comprehensive resource of nearly everything involved with...   more
  • 19.  

    Information Security Risk Analysis

     By Thomas R Peltier [Ebook, Adobe pdf 2005]
    Rs. 2,503 2,253 (10% OFF)
    Discontinued Description: Information Security Risk Analysis will allow any organization to implement risk management techniques that will prove to be cost effective. Using the PARA (Practical Application of Risk Analysis) process the book examines the qualitative risk analysis process and then provides tested variations on the methodology. The PARA process can...   more
  • 20.  

    Investigating Computer- Related Crime

     By Peter Stephenson [Ebook, Adobe pdf 1999]
    Rs. 3,288 2,959 (10% OFF)
    Discontinued Written by an information security specialist, this second edition of Investigating Computer-Related Crime discusses cybercrime, its investigation, and the difficulties encountered by both public law enforcement officials and private corporate investigators. The book offers insights into collecting evidence, interrogating suspects and witnesses, handling crime in progress, as well as issues...   more
    Other Editions: Hardcover 2007, 2nd Edition
< Previous 1 2 3 4 5 6 7 8 9 10 Next >
Showing 1-20 of 620