Bienvenue à la Bibliothèque Alo de l'Université Shalom de Bunia
Retourner au premier écran avec les dernières notices... | Votre compte |
Détail de l'indexation
005.8 : S├®curit├® des donn├®es. Protection contre le piratage informatique
Ouvrages de la bibliothèque en indexation 005.8

![]()
document électronique
**The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities **
** **
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But...![]()
document électronique
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws...![]()
texte imprimé
![]()
document électronique
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has be...![]()
document électronique
"The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented...![]()
document électronique
Tighten holes and maintain security on your Linux system! From the publisher of the international best-seller, Hacking Exposed: Network Security Secrets & Solutions, comes this must-have security handbook for anyone running Linux. This up-to-date ...![]()
document électronique
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading e...![]()
document électronique
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider IT Attacks
An organizationÔÇÖs employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a syst...![]()
document électronique
"In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of ""brick-and-mortar"" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity the...![]()
document électronique
Kerberos, the single sign-on authentication system originally developed at Mit, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity...![]()
document électronique
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grou...![]()
document électronique
"Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any...![]()
document électronique
"""The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series i...![]()
document électronique
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.
As the clich├® goes, information is power. In this age of technology, an increasing majority of the world's information is s...![]()
document électronique
When *Practical Unix Security* was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed In...![]()
document électronique
*Pro Apache Struts with Ajax* maps out how to use the Apache Struts MVC web framework, so you can solve everyday web application development challenges. This book takes an application-centric approach: the development of an application drives Stru...![]()
document électronique
Your Linux system will be attacked. Be ready! *Real World Linux Security, Second Edition* brings together state-of-the-art solutions and exclusive software for protecting yourself against today's most vicious Internet attacks. Highlights include s...![]()
texte imprimé
![]()
texte imprimé
![]()
texte imprimé
![]()
document électronique
![]()
texte imprimé
![]()
document électronique
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm. What's the worst an attacker can do to you? You'...![]()
document électronique
SELinux: Bring World-Class Security to Any Linux Environment!
SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure solutions. Now that SELinux is included ...![]()
document électronique
In *Technological Turf Wars*, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships a...![]()
document électronique
OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher.Peter N.M. Hansteen's PF website and conference ...![]()
document électronique
A comprehensive reference book on Internet security concepts, principles, and industry best practices - for readers who want to build a complete "security blanket" for their organizational networks.
...![]()
document électronique
**The HackerÔÇÖs Handbook: The Strategy Behind Breaking Into and Defending Networks**, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. Th...![]()
document électronique
"The book you are about to read will arm you with the knowledge you need to defend your network from attackersÔÇöboth the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a gr...![]()
texte imprimé