• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3090713]
• Literatura piękna
 [1812092]
• Turystyka
 [52353]
• Informatyka
 [156406]
• Komiksy
 [36497]
• Encyklopedie
 [23076]
• Dziecięca
 [611051]
• Hobby
 [103270]
• AudioBooki
 [1744]
• Literatura faktu
 [194823]
• Muzyka CD
 [382]
• Słowniki
 [2994]
• Inne
 [446649]
• Kalendarze
 [242]
• Podręczniki
 [166396]
• Poradniki
 [420635]
• Religia
 [508575]
• Czasopisma
 [545]
• Sport
 [61132]
• Sztuka
 [249371]
• CD, DVD, Video
 [3442]
• Technologie
 [230899]
• Zdrowie
 [98302]
• Książkowe Klimaty
 [126]
• Zabawki
 [2532]
• Puzzle, gry
 [4027]
• Literatura w języku ukraińskim
 [273]
• Art. papiernicze i szkolne
 [8376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5133

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W. Shinder 9781597491990 Syngress Publishing
Dr. Tom Shinder's ISA Server 2006 Migration Guide

ISBN: 9781597491990 / Angielski / Miękka / 2007 / 637 str.

ISBN: 9781597491990/Angielski/Miękka/2007/637 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dr. Thomas W. Shinder
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.

* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange...

Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
cena: 183,02

Configuring Sonicwall Firewalls Bendell, Dan 9781597492508 Syngress Publishing
Configuring Sonicwall Firewalls

ISBN: 9781597492508 / Angielski / Miękka / 2006 / 500 str.

ISBN: 9781597492508/Angielski/Miękka/2006/500 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Chris Lathem; Benjamin W. Fortenberry; Kevin Lynn
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.

This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals....

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in...
cena: 197,85

Semantic Web Services: Theory, Tools, and Applications Cardoso, Jorge 9781599040455 Information Science Reference
Semantic Web Services: Theory, Tools, and Applications

ISBN: 9781599040455 / Angielski / Twarda / 2007 / 353 str.

ISBN: 9781599040455/Angielski/Twarda/2007/353 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jorge Cardoso
The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive and transportable machine understanding. Semantic Web Services: Theory, Tools and Applications brings contributions from researchers, scientists from both industry and academia, and representatives from different communities to study, understand, and explore the theory, tools, and applications of the semantic Web. Semantic Web Services: Theory, Tools and Applications binds computing involving the semantic Web, ontologies, knowledge management, Web...
The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive an...
cena: 854,87

Advances in Enterprise Information Technology Security Djamel Khadraoui Francine Herrmann 9781599040905 Idea Group Reference
Advances in Enterprise Information Technology Security

ISBN: 9781599040905 / Angielski / Twarda / 2007 / 368 str.

ISBN: 9781599040905/Angielski/Twarda/2007/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Djamel Khadraoui; Francine Herrmann
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined.
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterpris...
cena: 854,87

Secure E-Government Web Services Mitrakas, Andreas 9781599041384 IGI Global
Secure E-Government Web Services

ISBN: 9781599041384 / Angielski / Twarda / 2006 / 335 str.

ISBN: 9781599041384/Angielski/Twarda/2006/335 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Andreas Mitrakas; Pim Hengeveld; Despina Polemi
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
cena: 515,59

Integrating Security and Software Engineering: Advances and Future Vision Mouratidis, Haralambos 9781599041476 IGI Global
Integrating Security and Software Engineering: Advances and Future Vision

ISBN: 9781599041476 / Angielski / Twarda / 2006

ISBN: 9781599041476/Angielski/Twarda/2006

Termin realizacji zamówienia: ok. 30 dni roboczych.
Haralambos Mouratidis; Paolo Giorgini
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. Integrating Security and Software Engineering: Advances and Future Visions discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and soft...
cena: 489,55

Web Services Security and E-Business Radhamani, G. 9781599041681 IGI Global
Web Services Security and E-Business

ISBN: 9781599041681 / Angielski / Twarda / 2006 / 394 str.

ISBN: 9781599041681/Angielski/Twarda/2006/394 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
G. Radhamani; G. S. V. Radha Krishna Rao
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems.Web Services Security and E-Business provides insight into uncovering the security...
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access contro...
cena: 489,55

Knowledge Discovery and Data Mining: Challenges and Realities Zhu, Xingquan 9781599042527 Information Science Reference
Knowledge Discovery and Data Mining: Challenges and Realities

ISBN: 9781599042527 / Angielski / Twarda / 2007 / 274 str.

ISBN: 9781599042527/Angielski/Twarda/2007/274 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Xingquan Zhu; Ian Davidson
Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data Mining: Challenges and Realities is the most comprehensive reference publication for researchers and real-world data mining practitioners to advance knowledge discovery from low-quality data. This Premier Reference Source presents in-depth experiences and methodologies, providing theoretical and empirical guidance to users who have suffered from underlying, low-quality data. International experts in the field of data mining have contributed...
Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data M...
cena: 854,11

Contemporary Issues in Database Design and Information Systems Development Keng Siau 9781599042893 Idea Group Reference
Contemporary Issues in Database Design and Information Systems Development

ISBN: 9781599042893 / Angielski / Twarda / 2007 / 331 str.

ISBN: 9781599042893/Angielski/Twarda/2007/331 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Keng Siau
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chap...
cena: 515,59

Cryptography and Security Services: Mechanisms and Applications Mogollon, Manuel 9781599048376 Cybertech Publishing
Cryptography and Security Services: Mechanisms and Applications

ISBN: 9781599048376 / Angielski / Twarda / 2008 / 490 str.

ISBN: 9781599048376/Angielski/Twarda/2008/490 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Manuel Mogollon
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
cena: 517,84

Handbook of Research on Wireless Security: 2 V Zhang 9781599048994 Information Science Reference
Handbook of Research on Wireless Security: 2 V

ISBN: 9781599048994 / Angielski / Twarda / 2008 / 934 str.

ISBN: 9781599048994/Angielski/Twarda/2008/934 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yan Zhang; Jun Zheng; Miao Ma
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless...
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and servic...
cena: 2702,95

The Cryptogic Password Protocol Sean Gilbertson, Murli Bhamidipati 9781844012510 New Generation Publishing
The Cryptogic Password Protocol

ISBN: 9781844012510 / Angielski / Miękka / 2004 / 52 str.

ISBN: 9781844012510/Angielski/Miękka/2004/52 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Gilbertson;Murli Bhamidipati
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome the simple approaches used by the public to manage their passwords and PINs. Imagine if: - You could have different and sophisticated passwords and PINs for each service. - There were no limits to the number of different passwords/PINs you could manage in your mind without having to memorise them. -...
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...?...
cena: 56,68

Security Modeling and Analysis of Mobile Agent Systems Tsai, Jeffrey J. P. 9781860946349 World Scientific Publishing Company
Security Modeling and Analysis of Mobile Agent Systems

ISBN: 9781860946349 / Angielski / Twarda / 2006 / 212 str.

ISBN: 9781860946349/Angielski/Twarda/2006/212 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jeffrey J. P. Tsai; Lu Ma
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure...
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse a...
cena: 484,87

Avoiding Project Disaster: Titanic Lessons for It Executives Kozak-Holland, Mark 9781895186734 Multi-Media Publications Inc
Avoiding Project Disaster: Titanic Lessons for It Executives

ISBN: 9781895186734 / Angielski / Miękka / 2006 / 312 str.

ISBN: 9781895186734/Angielski/Miękka/2006/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Kozak-Holland
cena: 155,62

SpamAssassin: A practical guide to integration and configuration McDonald, Alistair 9781904811121 Packt Publishing
SpamAssassin: A practical guide to integration and configuration

ISBN: 9781904811121 / Angielski / Miękka / 2004 / 240 str.

ISBN: 9781904811121/Angielski/Miękka/2004/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Alistair McDonald
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business requirements .Learn how to detect and prevent spam .Optimize SpamAssassin for all major mail servers and clients .Discover how to use SpamAssassin as a service Free to use, flexible, and effective, SpamAssassin has become the most popular Open Source antispam application. Its unique combination of power and flexibility make it the right choice. This book will now help you set up and optimize SpamAssassin for your network. As a system administrator,...
In depth guide to implementing antispam solutions using SpamAssassin .Implement the right antispam solution for your network and your business require...
cena: 200,66

Database Integrity : Challenges and Solutions Jorge H. Doorn Laura C. Rivero Laurn Rivero 9781930708389 IGI Global
Database Integrity : Challenges and Solutions

ISBN: 9781930708389 / Angielski / Twarda / 2002

ISBN: 9781930708389/Angielski/Twarda/2002

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jorge H. Doorn; Laura C. Rivero; Laurn Rivero
An effective database system should satify at least three basic integrity restrictions: unique keys, null restricts, and a special case of inclusion dependancies that allows the design of hierarchies and relationships over class entities. This text addresses these and a variety of other issues.
An effective database system should satify at least three basic integrity restrictions: unique keys, null restricts, and a special case of inclusion d...
cena: 390,60

Advanced Topics in Database Research : Volume One Keng Siau 9781930708419 IGI Global
Advanced Topics in Database Research : Volume One

ISBN: 9781930708419 / Angielski / Twarda / 2002 / 300 str.

ISBN: 9781930708419/Angielski/Twarda/2002/300 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Keng Siau
Advanced Topics in Database Research features the latest, cutting-edge research findings dealing with all aspects of database management, systems analysis and design and software engineering. This book provides information that is instrumental in the improvement and development of theory and practice related to information technology and management of information resources.
Advanced Topics in Database Research features the latest, cutting-edge research findings dealing with all aspects of database management, systems anal...
cena: 390,60

Advanced Topics in Information Resources Management Mehdi Khosrow-Pour 9781930708440 IGI Global
Advanced Topics in Information Resources Management

ISBN: 9781930708440 / Angielski / Twarda / 2002

ISBN: 9781930708440/Angielski/Twarda/2002

Termin realizacji zamówienia: ok. 30 dni roboczych.
Mehdi Khosrow-Pour
Advanced Topics in Information Resources Management features the latest research findings dealing with all aspects of information resources management, managerial and organisational applications, as well as implications of information technology organisations. It aims to be instrumental in the improvement and development of the theory and practice of information resources management, appealing to both practising managers and academics. In addition, it educates organisations on how they can benefit from their information resources and all the tools needed to gather, process, disseminate and...
Advanced Topics in Information Resources Management features the latest research findings dealing with all aspects of information resources management...
cena: 390,60

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security Chris Hurley (Senior Penetration Tester, Washington, DC, USA) 9781931836036 Syngress Media,U.S.
WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

ISBN: 9781931836036 / Angielski / Miękka / 2004 / 520 str.

ISBN: 9781931836036/Angielski/Miękka/2004/520 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA DC Washington Chris Hurley (Senior Penetration Tester
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very...
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urb...
cena: 305,98

Stealing the Network: How to Own a Continent Russell, Ryan 9781931836050 Syngress Publishing
Stealing the Network: How to Own a Continent

ISBN: 9781931836050 / Angielski / Skoroszyt / 2004 / 402 str.

ISBN: 9781931836050/Angielski/Skoroszyt/2004/402 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
131ah; Russ Rogers; Jay Beale
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"

* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event...

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable critici...
cena: 197,85

Podprzednia  10  11  12  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia