Zone Labs

Spyware - Computer Security - Computer Protection - Software

Phishing - Spam - Email Virus - Antivirus






Password Journal (a Diary For Internet Login Security)

RRP $13.99

Never forget your passwords again with this handy little Password Journal This diary for Internet Security gives you a convenient place for you to safely store all your passwords and login information. This log-book is a proper size so that you can stick it with your notebook computer, tablet, desktop, or any other device you may be using. This diary allows you to write the site address (like Facebook, Google, Pinterest, Geico, E-trade, Amazon, etc) and then write your password and the date you made it. This way, you will be able to see when it's time to update your password. Also, there is room for notes (which could be useful for back-up security questions or more). Trust me, I know that it is becoming more complicated to keep track of everything. This book should eliminate some of that headache. Also, for quick reference there is an editable Table of Contents where you fill in the Site Name and Page Number. With this handy Password Journal you will never be stuck scratching your head while racking your brain for passwords that just aren't used often. Simplify your Internet life with this pass-code diary.


Analyzing Computer Security

RRP $261.99

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with extensive real-world examples throughout results in a very effective learning methodology.”

—Charles C. Palmer, IBM Research 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures

 

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security—so you can prevent serious problems and mitigate the effects of those that still occur.

 

In this new book, renowned security and software engineering experts Charles P. Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in Computing—teach security the way modern security professionals approach it: by identifying the people or things that may cause harm, uncovering weaknesses that can be exploited, and choosing and applying the right protections. With this approach, not only will you study cases of attacks that have occurred, but you will also learn to apply this methodology to new situations.

 

The book covers “hot button” issues, such as authentication failures, network interception, and denial of service. You also gain new insight into broader themes, including risk analysis, usability, trust, privacy, ethics, and forensics. One step at a time, the book systematically helps you develop the problem-solving skills needed to protect any information infrastructure.

 

Coverage includes 

  • Understanding threats, vulnerabilities, and countermeasures
  • Knowing when security is useful, and when it’s useless “security theater”
  • Implementing effective identification and authentication systems
  • Using modern cryptography and overcoming weaknesses in cryptographic systems
  • Protecting against malicious code: viruses, Trojans, worms, rootkits, keyloggers, and more
  • Understanding, preventing, and mitigating DOS and DDOS attacks
  • Architecting more secure wired and wireless networks
  • Building more secure application software and operating systems through more solid designs and layered protection
  • Protecting identities and enforcing privacy
  • Addressing computer threats in critical areas such as cloud computing, e-voting, cyberwarfare, and social media

 


Introduction To Network Security

RRP $316.00

Introductory textbook in the important area of network security for undergraduate and graduate students

• Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security
• Fully updated to reflect new developments in network security
• Introduces a chapter on Cloud security, a very popular and essential topic
• Uses everyday examples that most computer users experience to illustrate important principles and mechanisms
• Features a companion website with Powerpoint slides for lectures and solution manuals to selected exercise problems, available at http://www.cs.uml.edu/~wang/NetSec


Computer Networking

RRP $515.99

ALERT: Before you purchase, check with your instructor or review your course syllabus to ensure that you select the correct ISBN. Several versions of Pearson's MyLab & Mastering products exist for each title, including customized versions for individual schools, and registrations are not transferable. In addition, you may need a CourseID, provided by your instructor, to register for and use Pearson's MyLab & Mastering products.

 

Student can use the URL and phone number below to help answer their questions:

http://247pearsoned.custhelp.com/app/home

800-677-6337

 

Packages

Access codes for Pearson's MyLab & Mastering products may not be included when purchasing or renting from companies other than Pearson; check with the seller before completing your purchase.

 

Used or rental books

If you rent or purchase a used book with an access code, the access code may have been redeemed previously and you may have to purchase a new access code.

 

Access codes

Access codes that are purchased from sellers other than Pearson carry a higher risk of being either the wrong ISBN or a previously redeemed code. Check with the seller prior to purchase.

 

0134522206 / 9780134522203 Computer Networking: A Top Down Approach Plus Modified MasteringEngineering with Pearson eText -- Access Card Package 7/e

 

Package consists of:   

0133594149 / 9780133594140 Computer Networking: A Top-Down Approach

0134311167 / 9780134311166 Modified MasteringEngineering with Pearson eText -- Standalone Access Card -- for Computer Networking: A Top-Down Approach


Environmental Protection, Security And Armed Conflict

RRP $272.99

This book explores environmental protection relevant to security and armed conflict from a sustainable development perspective. The author details how at each stage of the armed conflict life cycle, policy, law and enforcement have fallen short of the sustainable development model and concludes with a set of suggestions for how to address this pressing concern. The book considers and discusses: * Environmental protection relevant to security and armed conflict from a holistically sustainable development perspective. * Environmental protection relevant to security and armed conflict in the life cycle of armed conflict: pre-conflict, in-conflict and post-conflict * Uses substantive sustainable development principles (duty of states to ensure sustainable use of natural resources; equity and the eradication of poverty; common but differentiated responsibilities; precautionary principle; public participation; good governance; integration and interrelationship; and polluter pays principle) as tools or objectives to achieve sustainable development in the context of environmental protection relevant to security and armed conflict. * The concept of sustainable development is utilized to fill the gaps left by policy and law in the field of environmental protection relevant to security and armed conflict. The book also examines five case-studies relating to Somalia, Darfur, Sudan, Sierra Leone, the First Gulf war and the Kosovo conflict. This fascinating and detailed study will strongly appeal to academics and postgraduate students in the fields of both environmental protection and international law, researchers, policy-makers, NGOs and individuals working in the field.



Search

Zone Labs Articles

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs Books

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs