Zone Labs

Spyware - Computer Security - Computer Protection - Software

Phishing - Spam - Email Virus - Antivirus






Password Journal (a Diary For Internet Login Security)

RRP $13.99

Never forget your passwords again with this handy little Password Journal This diary for Internet Security gives you a convenient place for you to safely store all your passwords and login information. This log-book is a proper size so that you can stick it with your notebook computer, tablet, desktop, or any other device you may be using. This diary allows you to write the site address (like Facebook, Google, Pinterest, Geico, E-trade, Amazon, etc) and then write your password and the date you made it. This way, you will be able to see when it's time to update your password. Also, there is room for notes (which could be useful for back-up security questions or more). Trust me, I know that it is becoming more complicated to keep track of everything. This book should eliminate some of that headache. Also, for quick reference there is an editable Table of Contents where you fill in the Site Name and Page Number. With this handy Password Journal you will never be stuck scratching your head while racking your brain for passwords that just aren't used often. Simplify your Internet life with this pass-code diary.


Computer System And Network Security

RRP $308.99

Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers all aspects related to the growing field of computer security. Such complete coverage in a single text has previously been unavailable, and college professors and students, as well as professionals responsible for system security, will find this unique book a valuable source of information, either as a textbook or as a general reference.
Computer System and Network Security discusses existing and potential threats to computer systems and networks and outlines the basic actions that are generally taken to protect them. The first two chapters of the text introduce the reader to the field of computer security, covering fundamental issues and objectives. The next several chapters describe security models, authentication issues, access control, intrusion detection, and damage control. Later chapters address network and database security and systems/networks connected to wide-area networks and internetworks. Other topics include firewalls, cryptography, malicious software, and security standards. The book includes case studies with information about incidents involving computer security, illustrating the problems and potential damage that can be caused when security fails.
This unique reference/textbook covers all aspects of computer and network security, filling an obvious gap in the existing literature.


Statistical Methods In Computer Security

RRP $320.99

Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software, firewalls, and other network security equipment.


Digital Design And Computer Organization

RRP $248.99

Digital Design and Computer Organization introduces digital design as it applies to the creation of computer systems. It summarizes the tools of logic design and their mathematical basis, along with in depth coverage of combinational and sequential circuits.
The book includes an accompanying CD that includes the majority of circuits highlighted in the text, delivering you hands-on experience in the simulation and observation of circuit functionality. These circuits were designed and tested with a user-friendly Electronics Workbench package (Multisim Textbook Edition) that enables your progression from truth tables onward to more complex designs.
This volume differs from traditional digital design texts by providing a complete design of an AC-based CPU, allowing you to apply digital design directly to computer architecture. The book makes minimal reference to electrical properties and is vendor independent, allowing emphasis on the general design principles.


The Politics Of Security

RRP $488.99

In this critique of security studies, with insights into the thinking of Heidegger, Foucault, Derrida, Levinas and Arendt, Michael Dillon contributes to the rethinking of some of the fundamentals of international politics, developing what might be called a political philosophy of continental thought. Drawing on the work of Martin Heidegger, "Politics of Security" establishes the relationship between Heidegger's radical hermeneutical phenomenology and politics and the fundamental link between politics, the tragic and the ethical. It breaks new ground by providing an etymology of security, tracing the word back to the Greek "asphaleia"--meaning not to trip up or fall down-- and a unique political reading of "Oedipus Rex." Michael Dillon traces the roots of desire for security to the metaphysical desire for certitude, and points out that our way of seeking that security is embedded in 20th century technology, thus resulting in a global crisis.



Search

Zone Labs Articles

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs Books

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs