
Edward Elgar Publishing UN iLibrary HeinOnline Directory of Open Access Books SAGE Journals ASTM Compass Arxiv
From this page you can:
Home |
Class number details
005.8














































Library items with class number 005.8



The basics of hacking and penetration testing / Patrick Engebretson
Title : The basics of hacking and penetration testing : ethical hacking and penetration testing made easy Material Type: printed text Authors: Patrick Engebretson, Author Edition statement: 2nd edition Publisher: Amsterdam : Syngress Publication Date: 2013 Pagination: xvii; 204 p. Size: 24 cm ISBN (or other code): 978-0-12-411644-3 General note: Includes index (p. 199-211) Languages : English (eng) Original Language : English (eng) Descriptors: Computer crimes
Computer hackers
Computer software
Penetration testingClass number: 005.8 Abstract: The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Contents note: What is Penetration Testing?; Reconnaissance; Scanning; Exploitation; Web Based Exploitation; Maintaining Access with Backdoors and Rootkits; Wrapping Up the Penetration Test; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=16652 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001684 005.8 Eng-Bas 2013 General Collection Library "Max van der Stoel" English Available 1702-001685 005.8 Eng-Bas 2013 General Collection SEEU Library Skopje English Available Building Web Applications with Erlang / Zachary Kessin
Title : Building Web Applications with Erlang Material Type: printed text Authors: Zachary Kessin, Author Publisher: Beijing : O'Reilly Publication Date: 2012 Pagination: xvi, 133 p. Size: 24 cm ISBN (or other code): 978-1-449-30996-1 General note: Includes index (p. 227-234) Languages : English (eng) Original Language : English (eng) Descriptors: Application software
ERLANG (Computer program language)
Web servicesClass number: 005.8 Abstract: Why choose Erlang for web applications? Discover the answer hands-on by building a simple web service with this book. If you’re an experienced web developer who knows basic Erlang, you’ll learn how to work with REST, dynamic content, web sockets, and concurrency through several examples. In the process, you’ll see first-hand that Erlang is ideal for building business-critical services. Erlang was designed for fault-tolerant, non-stop telecom systems, and building applications with it requires a large set of skills. By the end of the book, you’ll have the information you need to build a basic web service and get it running.
*Explore the power of Erlang and REST for building web services
*Serve static and dynamic content with the Yaws web server
*Use different methods for outputting data to user, such as encoding Erlang data structures into JSON or XML
*Build an application to listen for HTTP requests, process them, store data, and return useful data
*Go beyond the request-response model—push data to clients with web sockets
*Use Erlang and Yaws to stream data from the server to a client
"A book which is truly needed and will help get Erlang to the next level."Contents note: Building Scalable system with Erlang and REST; Getting Started with Yaws; Appmods: Dynamic Content in Yaws; Implementing REST; File Upload; WebSockets; Streaming; Using the HTTP Client; Building and Application with OTP; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17157 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001896 005.8 Kes-Bui 2012 General Collection Library "Max van der Stoel" English Available Computer Security / William Stallings
Title : Computer Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author Edition statement: 4th edition Publisher: Boston : Pearson/Addison Wesley Publication Date: 2017 Pagination: 777 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-13-479410-5 General note: Includes bibliographical references and index
Includes bibliographical footnotesLanguages : English (eng) Original Language : English (eng) Descriptors: Computer algorithms
Computer network
Computer security
Data encryptionClass number: 005.8 Abstract: The need for education in computer security and related topics continues to grow at a dramatic rate and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. Contents note: Computer Security Concepts; Threats, Attacks, and Assets; Standards; Computer Security Strategy; Digital User Authentications Principles; Random and Pseudo random Numbers; Access Control Principles; Honeypots; Software Security Issues; Application Security Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=18776 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002138 005.8 Sta-Com 2017 General Collection Library "Max van der Stoel" English Available 1702-002400 005.8 Sta-Com 2017 General Collection SEEU Library Skopje English Available Computer Security / William Stallings
Title : Computer Security : Principles and Practice Material Type: printed text Authors: William Stallings, Author ; Lawrie Brown, Author Edition statement: 4rth edition, Global Edition Publisher: Pearson Education Limited Publication Date: 2018 Pagination: 800 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-1-292-22061-1 General note: Includes bibliographical references (p. 764-776)
Includes index (p. 780-800)Languages : English (eng) Original Language : English (eng) Descriptors: Computer networks - Security measures
Computer security
Computer security - Examinations
Electronic data processing personnel - CertificationClass number: 005.8 Abstract: Computer Security: Principles and Practice - is ideal for courses in Computer/Network Security. The need for education in computer security and related topics continues to grow at a dramatic rate—and is essential for anyone studying Computer Science or Computer Engineering. Written for both an academic and professional audience, the 4th Edition continues to set the standard for computer security with a balanced presentation of principles and practice. The new edition captures the most up-to-date innovations and improvements while maintaining broad and comprehensive coverage of the entire field. The extensive offering of projects provides students with hands-on experience to reinforce concepts from the text. The range of supplemental online resources for instructors provides additional teaching support for this fast-moving subject. The new edition covers all security topics considered Core in the ACM/IEEE Computer Science Curricula 2013, as well as subject areas for CISSP (Certified Information Systems Security Professional) certification. This textbook can be used to prep for CISSP Certification and is often referred to as the ‘gold standard’ when it comes to information security certification. The text provides in-depth coverage of Computer Security, Technology and Principles, Software Security, Management Issues, Cryptographic Algorithms, Internet Security and more. Contents note: Overview; COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES : Cryptographic Tools; User Authentication; Access Control; Database and Data Center Security; Malicious Software; Denial-of-Service Attacks; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=21247 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002572 005.8 Sta-Com 2018 General Collection Library "Max van der Stoel" English Available 1702-002574 005.8 Sta-Com 2018 General Collection SEEU Library Skopje English Available Core security patterns / Christopher Steel
Title : Core security patterns : best practices and strategies for J2EE, Web services, and identity management Material Type: printed text Authors: Christopher Steel, Author ; Ramesh Nagappan, Author ; Ray Lai, Author Publisher: Upper Saddle River : Prentice Hall PTR Publication Date: 2006 Pagination: xlvi, 1041 p. Size: 24 cm ISBN (or other code): 978-0-13-146307-3 General note: Includes bibliographical references (p. 998)
Includes index (p. 999-1041)Languages : English (eng) Original Language : English (eng) Descriptors: Data structures (Computer science)
Java (Computer program language)Class number: 005.8 Abstract: Java provides the application developer with essential security mechanisms and support in avoiding critical security bugs common in other languages. A language, however, can only go so far. The developer must understand the security requirements of the application and how to use the features Java provides in order to meet those requirements. Core Security Patterns addresses both aspects of security and will be a guide to developers everywhere in creating more secure applications. Contents note: Security by Default; Basics of Security; Java Security Architecture and Technologies; The Java 2 Platform Security; Java Extensible Security Architecture and APIs; J2EE Security Architecture; Web services Security and Identity Management; Web Services Security - Standards and Technologies; Identity Management - Standards and Technologies; Security Design Methodology, Patterns and Reality checks; The Alchemy of Security Design : Security Methodology, Patterns and Reality checks; Design Strategies and Best Practices; Securing the Web Tier - Design Strategies and Best practices; Securing the Business Tier - Design Strategies and Best practices; Securing Web services - Design Strategies and Best practices; Securing the Identity - Design Strategies and Best practices; Secure Service Provisioning - Design Strategies and Best practices; Putting it all together; Building an End-to-End Security Architecture - Case Study; Personal Identification using smart cards and Biometrics; Secure Personal Identification using Smart Cards and Biometrics; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17171 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001802 005.8 Ste-Cor 2006 General Collection Library "Max van der Stoel" English Available Cryptography for Dummies / Chey Cobb
PermalinkCryptography and Network Security / William Stallings
PermalinkCryptography and Network Security / William Stallings
PermalinkCybersecurity essentials / Charles J. Brooks
PermalinkDigital identity / Phillip J. Windley
PermalinkDizajnimi dhe Implementimi i Sigurisë në Rrjetet Kompjuterike / Blerton Abazi
PermalinkEnterprise Solution Patterns Using Microsoft® .NET / David Trowbridge
PermalinkHacking for dummies / Kevin Beaver
PermalinkHands-on ethical hacking and network defense / Michael T. Simpson
PermalinkInformation security / Marie A. Wright, Marie A.
Permalink