Książka:  » Informatyka  » Bezpieczeństwo


• Nauka
 [2565149]
 [1027609]
 [69890]
• Komiksy
 [23066]
 [19650]
 [363569]
• Hobby
 [90571]
 [32465]
 [184801]
 [16955]
 [1940]
• Inne
 [216384]
 [3844]
 [57150]
 [281200]
• Religia
 [282879]
 [416]
• Sport
 [43126]
• Sztuka
 [146758]
 [2325]
 [111376]
• Zdrowie
 [58036]

Kategorie szczegółowe
BISAC
Książki nowe
Codzienna aktualizacja bazy
(cen i dostępności)
Realizacja zamówienia:
ok. 3 tygodni
Książki używane
Wycena na życzenie
Realizacja zamówienia:
ok. 4-8 tygodni

Książki są sprowadzane
z zagranicy

Przedpłata, dla firm FV 14 dni
Nie wysyłamy za pobraniem

Czytaj nas na:



ilość na stronie:

Wyświetl książki:
|
|
|
   
| skocz do strony:

Bezpieczeństwo

 Designing for Cisco Network Service Architectures (Arch) Foundation Learning Guide: CCDP Arch 300-320 Andre Laurent 9781587144622 CISCO
Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition


. Learn about the Cisco modular enterprise architecture

. Create highly available enterprise network designs

. Develop optimum Layer 3 designs

. Examine advanced WAN services design considerations

. Evaluate data center design considerations

. Design...
cena: 369,64
    
Designing for Cisco Network Service Architectures (Arch) Foundation Learning Guide: CCDP Arch 300-320
 Cyber-Assurance for the Internet of Things Tyson Brooks 9781119193869 Wiley-IEEE Press

Presents an Cyber-Assurance approach to the Internet of Things (IoT)

This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers...

cena: 649,79
    
Cyber-Assurance for the Internet of Things
 Cybersecurity Exposed: The Cyber House Rules Raef Meeuwisse 9781911452096 Cyber Simplicity Ltd

Mind the gap...between the actual level of cybersecurity and the amount required to protect you.
Ever wondered what exactly is going so badly wrong in society that the fastest booming industry in the world is cybercrime?
Psychology meets technology as this book explores how the rapid progression of technology is luring us all forwards at a pace that outstrips the human comfort...

cena: 71,15
    
Cybersecurity Exposed: The Cyber House Rules
 Topics in Cryptology CT-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, CA, USA, February 14-17, 2017. Proc Helena Handschuh 9783319521527 Springer

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017.

The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions.

CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to...

cena: 311,91
    
Topics in Cryptology CT-Rsa 2017: The Cryptographers' Track at the Rsa Conference 2017, San Francisco, CA, USA, February 14-17, 2017. Proc
 Security, Privacy and Reliability in Computer Communications and Networks Kewei Sha Aaron Striegel Min Song 9788793379893 River Publishers

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve...

Planowany termin premiery książki: 31-03-2017
Książkę można już zamówić z rabatem 5%
524,12
497,91
    
Security, Privacy and Reliability in Computer Communications and Networks
 Cybersecurity Dilemma Network Intrusions, Trust and Fear in the International System Buchanan, Ben 9781849047135
Reveals the pressure points for international relations precipitated by states' use of cyber espionage.
cena: 140,18
    
Cybersecurity Dilemma Network Intrusions, Trust and Fear in the International System
 

The overarching purpose of this book is to provide the reader with an examination of some of the most cutting edge issues impacting American Police. It examines both the present state of policing and what s promising in the future. In essence, the book considers the trends, issues, technologies, and challenges that define policing in the present and the impact they will have on policing in the...

cena: 316,84
    
Policing Trends and Issues in America
 Zero Day: China's Cyber Wars T. L. Williams Emily Carmain 9780988440067 First Coast Publishers, LLC

CIA veteran T. L. Williams unfolds a chilling--and highly conceivable--scenario in his latest novel, ZERO DAY: China's Cyber Wars. Moving between Chongqing, China and Langley, Virginia, this fast-paced spy thriller revolves around a plot by the Chinese government to seize the edge on global power by undermining the U.S. economy. Armed with an underground force of hackers, China's...

Planowany termin premiery książki: 01-02-2017
Książkę można już zamówić z rabatem 5%
75,30
71,53
    
Zero Day: China's Cyber Wars
 Threat Assessment and Management Strategies: Identifying the Howlers and Hunters Frederick S. Calhoun Stephen W. Westo 9781498721844 CRC Press

The field of threat assessment and the research surrounding it have exploded since the first edition of Threat Assessment and Management Strategies: Identifying the Howlers and Hunters. To reflect those changes, this second edition contains more than 100 new pages of material, including several new chapters, charts, and illustrations, as well as updated cases.

The book has been...

cena: 274,00
    
Threat Assessment and Management Strategies: Identifying the Howlers and Hunters
 Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations Fei Hu 9781498723183 CRC Press

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It...

cena: 466,29
    
Security and Privacy in Internet of Things (Iots): Models, Algorithms, and Implementations
 Implementing Digital Forensic Readiness: From Reactive to Proactive Process Jason Sachowski 9780128044544 SYNGRESS MEDIA

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics aligns strategically within an organization s business operations and information...

cena: 204,38
    
Implementing Digital Forensic Readiness: From Reactive to Proactive Process
 Cryptography & Comptia A+ Solis Tech 9781523426270 Createspace Independent Publishing Platform

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work?

Purchase Cryptography to discover everything you need to know about it

Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase

...
cena: 78,44
    
Cryptography & Comptia A+
 Introduction to Coding Theory, Second Edition Juergen Bierbrauer 9781482299809 CRC Press

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a...

cena: 349,08
    
Introduction to Coding Theory, Second Edition
 Security in Network Coding Peng Zhang Chuang Lin 9783319310824 Springer
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a...
cena: 409,11
    
Security in Network Coding
 IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS Amjad Inamdar 9781587144608 CISCO
Create and manage highly-secure Ipsec VPNs with IKEv2 and Cisco FlexVPN


The IKEv2 protocol significantly improves VPN security, and Cisco s FlexVPN offers a unified paradigm and command line interface for taking full advantage of it. Simple and modular, FlexVPN relies extensively on tunnel interfaces while maximizing compatibility with legacy VPNs. Now, two Cisco network...
cena: 301,51
    
IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
 Password Log: Large Print - Colorful Puzzle Pieces Writedrawdesign 9781530219742 Createspace Independent Publishing Platform
Revolutionary NEW user-friendly layout gives YOU complete control and eliminates wasted space in your password log Are you tired of password logs that just don't work well for the accounts YOU need to keep track of? ... where there are too many alphabetized sections that you don't need and too few of the sections that you DO need? ... where you can't find replacement inserts for your password...
cena: 42,59
    
Password Log: Large Print - Colorful Puzzle Pieces
ilość książek w kategorii: 4221