
ilość książek w kategorii: 5021
![]() |
Journal of Cyber Security and Mobility (6-1)
ISBN: 9788793609419 / Angielski / Miękka / 2017 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
192,03 |
![]() |
Journal of Cyber Security and Mobility (6-2)
ISBN: 9788793609624 / Angielski / Miękka / 2017 / 250 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
192,03 |
![]() |
Shifting the Security Paradigm - The Risks of Information Assurance
ISBN: 9783836427395 / Angielski / Miękka / 2007 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become increasingly exposed to data quality vulnerabilities that mimic integrity failures within the Information Assurance (IA) security program. This is a result of the current IA policies not having the controls needed to mitigate risks involving data quality (accuracy, relevance, timeliness, usability, completeness, brevity, and security) beyond the current list of limited security issues. Such narrowness of scope increases uncertainty among...
As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers become ...
|
cena:
192,57 |
![]() |
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us
ISBN: 9780137929238 / Angielski / Miękka / 2023 Termin realizacji zamówienia: ok. 10-14 dni roboczych. |
cena:
193,68 |
![]() |
CyberCrime - A Clear and Present Danger: The CEO's Guide to Cyber Security
ISBN: 9781500313517 / Angielski / Miękka / 2014 / 148 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,02 |
![]() |
Linux Forensics
ISBN: 9781515037637 / Angielski / Miękka / 2015 / 370 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensics on Linux systems. It is also a great asset for anyone that would like to better understand Linux internals. Linux Forensics will guide you step by step through the process of investigating a computer running Linux. Everything you need to know from the moment you receive the call from someone who thinks they have been attacked until the final report is written is covered in this book. All of the tools discussed in this book are free and most... Linux Forensics is the most comprehensive and up-to-date resource for those wishing to quickly and efficiently perform forensics on Linux sy... |
cena:
195,02 |
![]() |
Windows Forensics
ISBN: 9781535312431 / Angielski / Miękka / 2016 / 554 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Windows Forensics is the most comprehensive and up-to-date resource for those wishing to leverage the power of Linux and free software in order to quickly and efficiently perform forensics on Windows systems. It is also a great asset for anyone that would like to better understand Windows internals. Windows Forensics will guide you step by step through the process of investigating a computer running Windows. Whatever the reason for performing forensics on a Windows system, be it incident response, a criminal... Windows Forensics is the most comprehensive and up-to-date resource for those wishing to leverage the power of Li... |
cena:
195,02 |
![]() |
Building a Secure Healthcare Facility: Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Healthcare Facilities
ISBN: 9798306285818 / Angielski / Miękka / 2025 / 204 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,02 |
![]() |
Sockets, Shellcode, Porting, & Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
ISBN: 9781597490054 / Angielski / Miękka / 2005 / 667 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP,...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1....
|
cena:
195,06 |
![]() |
Configuring Sonicwall Firewalls
ISBN: 9781597492508 / Angielski / Miękka / 2006 / 500 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years. This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals....
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in...
|
cena:
195,06 |
![]() |
Stealing the Network: How to Own a Continent
ISBN: 9781931836050 / Angielski / Skoroszyt / 2004 / 402 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event...
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable critici...
|
cena:
195,06 |
![]() |
Mastering Global Information Systems
ISBN: 9780333689516 / Angielski / Miękka / 1997 / 264 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book provides an excellent foundation in modern information systems and data communications. It has five basic themes: * Digital Information Sources and Multimedia
* The Internet, the World Wide Web and Java * Local area Networking * Wide area Networking * Video Conferencing The information sources material covers the main standards in digital information on modern computer systems. It includes the conversion of sound and images into a digital format. The networking material introduces the main local area network technologies: * Ethernet * Token Ring *... This book provides an excellent foundation in modern information systems and data communications. It has five basic themes: * Digital Information ...
|
cena:
195,06 |
![]() |
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
ISBN: 9781597499514 / Angielski / Miękka / 2012 / 273 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this... How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web App... |
cena:
195,06 |
![]() |
Blockchain: Transforming Your Business and Our World
ISBN: 9781138313248 / Angielski / Miękka / 2018 / 202 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,06 |
![]() |
Security Without Obscurity: Frequently Asked Questions (Faq)
ISBN: 9780367708139 / Angielski / Miękka / 2022 / 236 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,06 |
![]() |
Threat Modeling Conversations
ISBN: 9781394293483 / Miękka / 2025 / 208 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
195,06 |
![]() |
A Beginner's Guide To Web Application Penetration Testing
ISBN: 9781394295593 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
195,06 |
![]() |
Preventing Bluetooth and Wireless Attacks in Iomt Healthcare Systems
ISBN: 9781394349418 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
195,06 |
![]() |
Computer Security: A Hands-on Approach
ISBN: 9781733003902 / Angielski / Miękka / 2019 / 442 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,08 |
![]() |
Internet Security: A Hands-on Approach
ISBN: 9781733003919 / Angielski / Miękka / 2019 / 456 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
195,08 |