
ilość książek w kategorii: 5023
![]() |
Hacklog Volume 1 Anonimato: Manuale sulla Sicurezza Informatica e Hacking Etico
ISBN: 9781520569918 / Włoski / Miękka / 2017 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
174,44 |
![]() |
Coin Wars: Who will win the cryptocurrency war?
ISBN: 9791198936028 / Angielski / Miękka / 2024 / 380 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
174,64 |
![]() |
Penetrationstests Erfolgreich Umsetzen: Praxisleitfaden - Regulatorik - Ki-Einfl?sse
ISBN: 9783658472610 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
174,92 |
![]() |
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing
ISBN: 9781410792327 / Angielski / Miękka / 2003 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
175,20 |
![]() |
Your Library Goes Virtual
ISBN: 9781586832193 / Angielski / Miękka / 2006 / 200 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This step-by-step guide is essential for both those exploring the concept of virtual school libraries and for those who want to enhance and expand theirs. It summarizes the latest information about student and teacher use of electronic resources and addresses the concept of virtual school libraries in the context of program administration, information access and delivery, and learning and teaching. This must-have resource will serve as a guide to developing virtual school libraries that become enriching and useful presences within schools and their communities. This step-by-step guide is essential for both those exploring the concept of virtual school libraries and for those who want to enhance and expand ... |
cena:
175,95 |
![]() |
Building Ethereum Dapps: Decentralized Applications on the Ethereum Blockchain
ISBN: 9781617295157 / Angielski / Miękka / 2019 / 504 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. |
cena:
176,07 |
![]() |
Java Cryptography
ISBN: 9781565924024 / Angielski / Miękka / 1998 / 364 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java... Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides t... |
cena:
176,99 |
![]() |
Configuring Netscreen Firewalls
ISBN: 9781932266399 / Angielski / Miękka / 2004 / 702 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals. Configuring NetScreen Firewalls is the first book to deliver an in-depth look at the NetScreen firewall product line. It covers all of the aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. Also covered are advanced troubleshooting techniques and the NetScreen Security...
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ...
|
cena:
176,99 |
![]() |
State Fragility Around the World: Fractured Justice and Fierce Reprisal
ISBN: 9780367867959 / Angielski / Miękka / 2019 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival
ISBN: 9780367869434 / Angielski / Miękka / 2019 / 222 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
Logical Investigative Methods: Critical Thinking and Reasoning for Successful Investigations
ISBN: 9780367870140 / Angielski / Miękka / 2019 / 290 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
Criminal Enterprise Investigation
ISBN: 9780367877033 / Angielski / Miękka / 2019 / 215 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
Cyber Security: An Introduction for Non-Technical Managers
ISBN: 9780367606114 / Angielski / Miękka / 2020 / 264 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
Mind the Tech Gap: Addressing the Conflicts between IT and Security Teams
ISBN: 9781032206172 / Angielski / Miękka / 2022 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
176,99 |
![]() |
String Searching Algorithms
ISBN: 9789810237035 / Angielski / Miękka / 1994 / 256 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A bibliographic overview of string searching and an anthology of descriptions of the principal algorithms available. Topics covered include methods for finding exact and approximate string matches, calculating "edit" distances between strings, and finding common sequences.
A bibliographic overview of string searching and an anthology of descriptions of the principal algorithms available. Topics covered include methods fo...
|
cena:
177,04 |
![]() |
Cyber Security
ISBN: 9781013270567 / Angielski / Miękka / 2020 / 184 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
177,60 |
![]() |
Elementary... the Art and Science of Finding Information: Achieving More "Knowledge Advantage" through OSINT - Revised and Expanded Edition
ISBN: 9781647188948 / Angielski / Twarda / 2019 / 636 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
177,60 |
![]() |
Cuckoo Malware Analysis
ISBN: 9781782169239 / Angielski / Miękka / 2013 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment. Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way. Cuckoo Malware...
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of...
|
cena:
177,77 |
![]() |
Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation
ISBN: 9781801074292 / Angielski / Miękka / 2022 / 450 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the organization is controlled to build a robust and secure environment. This book explores how purple team approaches and methodologies improve the functioning and collaborations of red and blue teaming.
Purple teaming isn't directly involved in attacking or defending a targeted system; it's mainly a cybersecurity consulting role ready to ensure the or...
|
cena:
177,77 |
![]() |
The Foundations of Threat Hunting: Organize and design effective cyber threat hunts to meet business needs
ISBN: 9781803242996 / Angielski / Miękka / 2022 / 246 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. The framework outlined in this book allows you to customize future threat hunts to what is necessary to meet business requirements while minimizing resource waste and non-value-added efforts.
Threat hunting takes the concept of cybersecurity well beyond what is possible with reactive, signature-based defenses by seeking out the adversary. T...
|
cena:
177,77 |