Web Directory

  Security (11)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

Regular Websites in this category

Database Nation: The Death of Privacy in the 21st Century Open in a new windowLink Details
- More than simply a journalistic summary of the current state of privacy rights and violations. It is a call to arms. Forty years ago, unbridled technology attacked our environment -- and few people seemed to know or care. Today, our environment still impe
- http://www.oreilly.com/catalog/dbnation/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Incident Response Open in a new windowLink Details
- Shows how to put in place an incident-response process that's as planned, efficient, and businesslike as any other IT operation in a mature organization. Includes both the technical and administrative aspects of building an effective incident response pla
- http://www.oreilly.com/catalog/incidentres/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Web Security & Commerce Open in a new windowLink Details
- Covers browser vulnerabilities, privacy concerns, issues with Java, JavaScript, ActiveX, and plug-ins, digital certificates, cryptography, Web server security, blocking software, censorship technology, and relevant civil and criminal issues.
- http://www.oreilly.com/catalog/websec/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Stopping Spam Open in a new windowLink Details
- This book describes spam -- unwanted email messages and inappropriate news articles -- and explains what you and your Internet service providers and administrators can do to prevent it, trace it, stop it, and even outlaw it.
- http://www.oreilly.com/catalog/spam/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Practical UNIX & Internet Security Open in a new windowLink Details
- Coverage of features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others.
- http://www.oreilly.com/catalog/puis/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
PGP: Pretty Good Privacy Open in a new windowLink Details
- This book is both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy.
- http://www.oreilly.com/catalog/pgp/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Oracle Security Open in a new windowLink Details
- Describes basic RDBMS security features and includes many practical strategies for securing an Oracle system, developing auditing and backup plans, and using the Oracle Enterprise Manager and Oracle Security Server.
- http://www.oreilly.com/catalog/orasec/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Cracking DES Open in a new windowLink Details
- The Data Encryption Standard withstood the test of time for twenty years. Cracking DES shows exactly how it was brought down. Every cryptographer, security designer, and student of cryptography policy should read this book to understand how the world chan
- http://www.oreilly.com/catalog/crackdes/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Computer Security Basics Open in a new windowLink Details
- Describes complicated concepts like trusted systems, encryption, and mandatory access control in simple terms.
- http://www.oreilly.com/catalog/csb/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Building Internet Firewalls, 2nd Edition Open in a new windowLink Details
- Detailed guide that provides step-by-step explanations of how to design and install firewalls and to configure Internet services to work with a firewall.
- http://www.oreilly.com/catalog/fire2/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Malicious Mobile Code : Virus Protection for Windows Open in a new windowLink Details
- "Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Reveals what such code can and can't do and how to recognize, remove, and prevent it.
- http://www.oreilly.com/catalog/malmobcode/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]