• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5011

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues Warkentin, Merrill 9781591409113 IGI Global
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues

ISBN: 9781591409113 / Angielski / Twarda / 2006 / 406 str.

ISBN: 9781591409113/Angielski/Twarda/2006/406 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Merrill Warkentin; Rayford Vaughn
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field how to create secure environments for the application of technology to serve future needs. This book bridges the gap between theory and practice, academia and industry, computer science and MIS. The chapters provide an integrated, holistic perspective on this complex set of challenges, supported with practical experiences of leading figures from all realms. Enterprise Information Systems Assurance and...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of ...
cena: 458,49

 Privacy Protection for E-Services Yee, George 9781591409144 IGI Global
Privacy Protection for E-Services

ISBN: 9781591409144 / Angielski / Twarda / 2006 / 303 str.

ISBN: 9781591409144/Angielski/Twarda/2006/303 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
George Yee
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a...
There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy pre...
cena: 483,98

 Cyber Warfare and Cyber Terrorism Andrew Colarik 9781591409915 Idea Group Reference
Cyber Warfare and Cyber Terrorism

ISBN: 9781591409915 / Angielski / Twarda / 2007 / 566 str.

ISBN: 9781591409915/Angielski/Twarda/2007/566 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Andrew Colarik
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and...
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologie...
cena: 828,36

 Hacking The Xbox Andrew Bunnie Huang 9781593270292 No Starch Press,US
Hacking The Xbox

ISBN: 9781593270292 / Angielski / Miękka / 2003 / 288 str.

ISBN: 9781593270292/Angielski/Miękka/2003/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Andrew Bunnie Huang

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.

Hacking the Xbox...

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essentia...

cena: 127,38

 Silence On The Wire Michal Zalewski 9781593270469 No Starch Press,US
Silence On The Wire

ISBN: 9781593270469 / Angielski / Miękka / 2005 / 312 str.

ISBN: 9781593270469/Angielski/Miękka/2005/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michal Zalewski

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an...

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. ...

cena: 203,64

 Understanding Voice Over IP Security Alan B. Johnston David M. Piscitello 9781596930506 Artech House Publishers
Understanding Voice Over IP Security

ISBN: 9781596930506 / Angielski / Twarda / 2006 / 261 str.

ISBN: 9781596930506/Angielski/Twarda/2006/261 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Alan B. Johnston; David M. Piscitello
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest topic with engineers in the field is how to secure these networks. The book teaches practitioners how to design a highly secure VoIP network, explains Internet security basics, such as attack types and methods, and more.
VoIP (voice over IP) networks are currently being deployed by enterprises, governments, and service providers around the globe. Today, the hottest top...
cena: 560,96

 Implementing the ISO/IEC 27001 Information Security Management System Standard Edward Humphreys 9781596931725 Artech House Publishers
Implementing the ISO/IEC 27001 Information Security Management System Standard

ISBN: 9781596931725 / Angielski / Twarda / 2007 / 286 str.

ISBN: 9781596931725/Angielski/Twarda/2007/286 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward Humphreys
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored by a recognized expert in the field, this authoritative and clear guide explores the ISO/IEC 27000 security standards and their implementation, focusing on the recent ISO/IEC 27001.
The ISO/IEC 27000 is a critical series of information security technology standards, and ISO/IEC 27001 is the newest release of this series. Authored ...
cena: 433,26

 Cisco PIX Firewalls: Configure / Manage / Troubleshoot Umer Khan 9781597490047 Syngress Media,U.S.
Cisco PIX Firewalls: Configure / Manage / Troubleshoot

ISBN: 9781597490047 / Angielski / Miękka / 2005 / 576 str.

ISBN: 9781597490047/Angielski/Miękka/2005/576 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Umer Khan
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.

  • The Cisco Pix firewall is the #1 market leading...
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 b...
cena: 301,13

 Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals James C. Foster Mike Price Stuart McClure 9781597490054 Syngress Publishing
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

ISBN: 9781597490054 / Angielski / Miękka / 2005 / 667 str.

ISBN: 9781597490054/Angielski/Miękka/2005/667 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
James C. Foster; Mike Price; Stuart McClure
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.

2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:

1....

cena: 195,86

 Perfect Password: Selection, Protection, Authentication Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security) 9781597490412 Syngress Media,U.S.
Perfect Password: Selection, Protection, Authentication

ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str.

ISBN: 9781597490412/Angielski/Miękka/2005/182 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
and writer consultant Mark Burnett (Independent researcher
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
cena: 156,26

 Security Log Management: Identifying Patterns in the Chaos Jacob Babbin (Contractor with a government agency filling the role of Intrusion Detection Team Lead) 9781597490429 Syngress Media,U.S.
Security Log Management: Identifying Patterns in the Chaos

ISBN: 9781597490429 / Angielski / Miękka / 2006 / 350 str.

ISBN: 9781597490429/Angielski/Miękka/2006/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jacob Babbin (Contractor with a government agency filling th
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to...
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can b...
cena: 301,13

 Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft Eric Cole, Sandra Ring 9781597490481 Syngress Media,U.S.
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

ISBN: 9781597490481 / Angielski / Miękka / 2006 / 350 str.

ISBN: 9781597490481/Angielski/Miękka/2006/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Cole;Sandra Ring
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today.

This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely...

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of...
cena: 215,28

 Syngress Force Emerging Threat Analysis: From Mischief to Malicious Robert Graham (Chief Scientist of Internet Security Systems, Inc) 9781597490566 Syngress Media,U.S.
Syngress Force Emerging Threat Analysis: From Mischief to Malicious

ISBN: 9781597490566 / Angielski / Miękka / 2006 / 500 str.

ISBN: 9781597490566/Angielski/Miękka/2006/500 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Robert Graham (Chief Scientist of Internet Security Systems
A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today

This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the "best of" this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future..

* From Practical VoIP Security, Thomas Porter, Ph.D. and...

A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library

This Syngress Anthology Helps You Protect Your Enterp...

cena: 301,13

 Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat Paul Piccard (Director of Threat Research for Webroot, USA) 9781597490641 Syngress Media,U.S.
Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat

ISBN: 9781597490641 / Angielski / Miękka / 2006 / 448 str.

ISBN: 9781597490641/Angielski/Miękka/2006/448 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) Paul Piccard (Director of Threat Research for Webroot
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.

Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines Spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in...

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware...
cena: 301,13

 Firewall Policies and VPN Configurations Syngress, Dale Liu, Stephanie Miller, Mark Lucas, Abhishek Singh (Security Researcher on the Microsoft Malware Protectio 9781597490887 Syngress Media,U.S.
Firewall Policies and VPN Configurations

ISBN: 9781597490887 / Angielski / Miękka / 2006 / 550 str.

ISBN: 9781597490887/Angielski/Miękka/2006/550 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Syngress;Dale Liu;Stephanie Miller
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security.

This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of...

A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful ...
cena: 301,13

 Cryptography for Developers Tom St Denis (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) 9781597491044 Syngress Media,U.S.
Cryptography for Developers

ISBN: 9781597491044 / Angielski / Miękka / 2006 / 400 str.

ISBN: 9781597491044/Angielski/Miękka/2006/400 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tom St Denis (senior software developer and cryptographer fo
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message authentication codes, combined authentication and encryption modes, public key cryptography and finally portable coding practices. Each chapter includes...

The only guide for software developers who must learn and implement cryptography safely and cost effectively.

Cryptography for Developers b...

cena: 365,52

 How to Cheat at Managing Information Security Mark Osborne (Cheif Information Security Officer at Interoute) 9781597491105 Syngress Media,U.S.
How to Cheat at Managing Information Security

ISBN: 9781597491105 / Angielski / Miękka / 2006 / 352 str.

ISBN: 9781597491105/Angielski/Miękka/2006/352 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Osborne (Cheif Information Security Officer at Interout
This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks.

These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non - technical principle and practices of security and provides basic information about the technical details...

This is the only book that covers all the topics that any budding security manager needs to know This book is written for managers responsible for IT...
cena: 247,47

 WarDriving and Wireless Penetration Testing Chris Hurley (Senior Penetration Tester, Washington, DC, USA), Russ Rogers, Frank Thornton (Owner, Blackthorn Systems, N 9781597491112 Syngress Media,U.S.
WarDriving and Wireless Penetration Testing

ISBN: 9781597491112 / Angielski / Miękka / 2007 / 446 str.

ISBN: 9781597491112/Angielski/Miękka/2007/446 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA DC Washington Chris Hurley (Senior Penetration Tester;Russ Rogers; US New Hampshire Blackthorn Systems Frank Thornton (Owner
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.

Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source...

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by prof...
cena: 285,03

 Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures Brian T Contos (CISSP, Chief Security Officer, ArcSight Inc.) 9781597491297 Syngress Media,U.S.
Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures

ISBN: 9781597491297 / Angielski / Miękka / 2007 / 304 str.

ISBN: 9781597491297/Angielski/Miękka/2007/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
ArcSight Inc. Chief Security Officer Brian T Contos (CISSP
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and hackers. It addresses the steps organizations must take to address insider threats at a people, process, and technology level.

Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats, and terrorists. They represent the next wave of security threats...

The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to ...
cena: 301,13

 Botnets: The Killer Web Applications Craig Schiller (CISO for Portland State University and President of Hawkeye Security Training, LLC), James R. Binkley (T 9781597491358 Syngress Media,U.S.
Botnets: The Killer Web Applications

ISBN: 9781597491358 / Angielski / Miękka / 2007 / 480 str.

ISBN: 9781597491358/Angielski/Miękka/2007/480 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Craig Schiller (CISO for Portland State University and Presi; and researcher network engineer James R. Binkley (Teacher;Anthony Bradley
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with...
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real w...
cena: 301,13

Podprzednia  10  11  12  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia