• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5011

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 XSS Attacks: Cross Site Scripting Exploits and Defense Seth Fogie (Vice President, Airscanner, Dallas, TX, USA), Jeremiah Grossman (Founder and CTO, WhiteHat Security, Santa C 9781597491549 Syngress Media,U.S.
XSS Attacks: Cross Site Scripting Exploits and Defense

ISBN: 9781597491549 / Angielski / Miękka / 2007 / 480 str.

ISBN: 9781597491549/Angielski/Miękka/2007/480 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) TX Dallas Airscanner Seth Fogie (Vice President; Santa WhiteHat Security Jeremiah Grossman (Founder and CTO;Robert Hansen (Founder of the Hackers.org Web Application Se
A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.

XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they are implemented, used, and abused. After XSS is thoroughly explored, the next part provides...

A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into p...
cena: 365,52

 Alternate Data Storage Forensics Amber Schroader (CEO, Paraben Corporation, Dallas, TX, USA), Tyler Cohen ((CISSP) Computer Science Corporation & Researc 9781597491631 Syngress Media,U.S.
Alternate Data Storage Forensics

ISBN: 9781597491631 / Angielski / Miękka / 2007 / 400 str.

ISBN: 9781597491631/Angielski/Miękka/2007/400 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
USA) TX Dallas Paraben Corporation Amber Schroader (CEO;Tyler Cohen ((CISSP) Computer Science Corporation & Research
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book sets a new forensic methodology standard for investigators to use.
This book begins by describing how alternate data storage devices are used to both move and hide data. From here a series of case studies using bleeding edge forensic analysis tools demonstrate to readers how to perform forensic investigations on a variety of...
Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths ...
cena: 365,52

 AVIEN Malware Defense Guide for the Enterprise David Harley (Formerly UK's National Health Service, National Infrastructure Security Manager, Independent author and co 9781597491648 Syngress Media,U.S.
AVIEN Malware Defense Guide for the Enterprise

ISBN: 9781597491648 / Angielski / Miękka / 2007 / 656 str.

ISBN: 9781597491648/Angielski/Miękka/2007/656 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nationa David Harley (Formerly UK's National Health Service;Robert S. Vibert;Ken Bechtel
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you.

AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about...

Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on ...
cena: 365,52

 Zen and the Art of Information Security Ira Winkler ((CISSP), President, Internet Security Advisors Group; author of Spies Among Us) 9781597491686 Syngress Media,U.S.
Zen and the Art of Information Security

ISBN: 9781597491686 / Angielski / Miękka / 2007 / 192 str.

ISBN: 9781597491686/Angielski/Miękka/2007/192 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Internet Security Advisors President Ira Winkler ((CISSP)
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is...
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security underst...
cena: 188,45

 How to Cheat at VoIP Security Thomas Porter, CISSP, CCNP, CCDA, CCS (Director of IT Security, FIFA 2006 World Cup), Michael Gough (Computer security c 9781597491693 Syngress Media,U.S.
How to Cheat at VoIP Security

ISBN: 9781597491693 / Angielski / Miękka / 2007 / 432 str.

ISBN: 9781597491693/Angielski/Miękka/2007/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
CCS (Director of IT Securi CCDA CCNP CISSP Thomas Porter; host and webmas Michael Gough (Computer security consultant
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
* VoIP Isn't Just Another Data Protocol
IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different....
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if VoIP engineering is not your specialty. It is the perfect in...
cena: 301,13

 How to Cheat at Configuring Open Source Security Tools Michael Gregg (President, Superior Solutions, Inc.), Eric S. Seagren (Eric Seagren, CISSP, CISA, ISSAP, JPMorganChase),  9781597491709 Syngress Media,U.S.
How to Cheat at Configuring Open Source Security Tools

ISBN: 9781597491709 / Angielski / Miękka / 2007 / 528 str.

ISBN: 9781597491709/Angielski/Miękka/2007/528 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Inc.) Superior Solutions Michael Gregg (President; JPMorganC ISSAP CISA CISSP Eric S. Seagren (Eric Seagren; D.C. Senior Scientist in the Ad Angela Orebaugh (Washington
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.

* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that...

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perf...
cena: 301,13

 Dr. Tom Shinder's ISA Server 2006 Migration Guide Thomas W. Shinder 9781597491990 Syngress Publishing
Dr. Tom Shinder's ISA Server 2006 Migration Guide

ISBN: 9781597491990 / Angielski / Miękka / 2007 / 637 str.

ISBN: 9781597491990/Angielski/Miękka/2007/637 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Dr. Thomas W. Shinder
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and tricks to perform a successful migration, rather than rehash all of the features which were rolled out in ISA Server 2004. Also, learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ.

* Highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
* Learn to Publish Exchange...

Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA ...
cena: 181,17

 Configuring Sonicwall Firewalls Bendell, Dan 9781597492508 Syngress Publishing
Configuring Sonicwall Firewalls

ISBN: 9781597492508 / Angielski / Miękka / 2006 / 500 str.

ISBN: 9781597492508/Angielski/Miękka/2006/500 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Chris Lathem; Benjamin W. Fortenberry; Kevin Lynn
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two years.

This is the first book on the market covering the #3 best-selling firewall appliances in the world from SonicWALL. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security professionals....

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in...
cena: 195,86

 Semantic Web Services: Theory, Tools, and Applications Cardoso, Jorge 9781599040455 Information Science Reference
Semantic Web Services: Theory, Tools, and Applications

ISBN: 9781599040455 / Angielski / Twarda / 2007 / 353 str.

ISBN: 9781599040455/Angielski/Twarda/2007/353 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jorge Cardoso
The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive and transportable machine understanding. Semantic Web Services: Theory, Tools and Applications brings contributions from researchers, scientists from both industry and academia, and representatives from different communities to study, understand, and explore the theory, tools, and applications of the semantic Web. Semantic Web Services: Theory, Tools and Applications binds computing involving the semantic Web, ontologies, knowledge management, Web...
The semantic Web proposes the mark-up of content on the Web using formal ontologies that structure underlying data for the purpose of comprehensive an...
cena: 841,04

 Advances in Enterprise Information Technology Security Djamel Khadraoui Francine Herrmann 9781599040905 Idea Group Reference
Advances in Enterprise Information Technology Security

ISBN: 9781599040905 / Angielski / Twarda / 2007 / 368 str.

ISBN: 9781599040905/Angielski/Twarda/2007/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Djamel Khadraoui; Francine Herrmann
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterprise IT activities. There are no simple and complete answers to the issues of security; therefore, multiple techniques, strategies, and applications are thoroughly examined.
Advances in Enterprise Information Technology Security" provides a broad working knowledge of all the major security issues affecting todays enterpris...
cena: 841,04

 Secure E-Government Web Services Mitrakas, Andreas 9781599041384 IGI Global
Secure E-Government Web Services

ISBN: 9781599041384 / Angielski / Twarda / 2006 / 335 str.

ISBN: 9781599041384/Angielski/Twarda/2006/335 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Andreas Mitrakas; Pim Hengeveld; Despina Polemi
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and service providers. The increasingly widespread use of Web services facilitates the exchange of data among various e-government applications, and paves the way for enhanced service delivery. Secure E-Government Web Services addresses various aspects of building secure e-government architectures and services, and presents the views of experts from academia, policy, and the industry to conclude that secure e-government Web services can be deployed in an...
As e-government applications are coming of age, security has been gradually becoming more demanding a requirement for users, administrators, and servi...
cena: 509,47

 Integrating Security and Software Engineering: Advances and Future Vision Mouratidis, Haralambos 9781599041476 IGI Global
Integrating Security and Software Engineering: Advances and Future Vision

ISBN: 9781599041476 / Angielski / Twarda / 2006

ISBN: 9781599041476/Angielski/Twarda/2006

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Haralambos Mouratidis; Paolo Giorgini
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. Integrating Security and Software Engineering: Advances and Future Visions discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Visions provides the first step towards narrowing the gap between security and soft...
cena: 483,98

 Web Services Security and E-Business Radhamani, G. 9781599041681 IGI Global
Web Services Security and E-Business

ISBN: 9781599041681 / Angielski / Twarda / 2006 / 394 str.

ISBN: 9781599041681/Angielski/Twarda/2006/394 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
G. Radhamani; G. S. V. Radha Krishna Rao
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems.Web Services Security and E-Business provides insight into uncovering the security...
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access contro...
cena: 483,98

 Knowledge Discovery and Data Mining: Challenges and Realities Zhu, Xingquan 9781599042527 Information Science Reference
Knowledge Discovery and Data Mining: Challenges and Realities

ISBN: 9781599042527 / Angielski / Twarda / 2007 / 274 str.

ISBN: 9781599042527/Angielski/Twarda/2007/274 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Xingquan Zhu; Ian Davidson
Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data Mining: Challenges and Realities is the most comprehensive reference publication for researchers and real-world data mining practitioners to advance knowledge discovery from low-quality data. This Premier Reference Source presents in-depth experiences and methodologies, providing theoretical and empirical guidance to users who have suffered from underlying, low-quality data. International experts in the field of data mining have contributed...
Knowledge discovery and data mining (KDD) is dedicated to exploring meaningful information from a large volume of data. Knowledge Discovery and Data M...
cena: 841,04

 Contemporary Issues in Database Design and Information Systems Development Keng Siau 9781599042893 Idea Group Reference
Contemporary Issues in Database Design and Information Systems Development

ISBN: 9781599042893 / Angielski / Twarda / 2007 / 331 str.

ISBN: 9781599042893/Angielski/Twarda/2007/331 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Keng Siau
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chapters in this innovative publication provide a representation of topnotch research in all areas of the database and information systems development.
"Contemporary Issues in Database Design and Information" presents the latest research ideas and topics on databases and software development. The chap...
cena: 509,47

 Cryptography and Security Services: Mechanisms and Applications Mogollon, Manuel 9781599048376 Cybertech Publishing
Cryptography and Security Services: Mechanisms and Applications

ISBN: 9781599048376 / Angielski / Twarda / 2008 / 490 str.

ISBN: 9781599048376/Angielski/Twarda/2008/490 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Manuel Mogollon
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms.
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing securi...
cena: 509,47

 Handbook of Research on Wireless Security: 2 V Zhang 9781599048994 Information Science Reference
Handbook of Research on Wireless Security: 2 V

ISBN: 9781599048994 / Angielski / Twarda / 2008 / 934 str.

ISBN: 9781599048994/Angielski/Twarda/2008/934 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yan Zhang; Jun Zheng; Miao Ma
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and services. As the field of wireless communications expands and inundates personal and professional lives worldwide, up-to-date wireless security research and knowledge becomes increasingly more vital to society. Handbook of Research on Wireless Security combines research from esteemed experts on security issues in various wireless communications, recent advances in wireless security, the wireless security model, and future directions in wireless...
Security is one of the most significant components in wireless systems to ensure the integrity of communications among terminals, networks, and servic...
cena: 2675,70

 The Cryptogic Password Protocol Sean Gilbertson, Murli Bhamidipati 9781844012510 New Generation Publishing
The Cryptogic Password Protocol

ISBN: 9781844012510 / Angielski / Miękka / 2004 / 52 str.

ISBN: 9781844012510/Angielski/Miękka/2004/52 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Gilbertson;Murli Bhamidipati
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...? Passwords and PINs control access to increasingly valuable services. Electronic fraud has risen dramatically because fraudsters can easily overcome the simple approaches used by the public to manage their passwords and PINs. Imagine if: - You could have different and sophisticated passwords and PINs for each service. - There were no limits to the number of different passwords/PINs you could manage in your mind without having to memorise them. -...
Use the same password or PIN for different services...? Keep forgetting your passwords or PINs...? Keep a written record of your passwords or PINs...?...
cena: 55,76

 Security Modeling and Analysis of Mobile Agent Systems Tsai, Jeffrey J. P. 9781860946349 World Scientific Publishing Company
Security Modeling and Analysis of Mobile Agent Systems

ISBN: 9781860946349 / Angielski / Twarda / 2006 / 212 str.

ISBN: 9781860946349/Angielski/Twarda/2006/212 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jeffrey J. P. Tsai; Lu Ma
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse and misuse, which broadens the scale of threats significantly. In addition, since mobile agents have some unique characteristics such as their mobility, security problems have become more complicated in these systems. These security problems have become a bottleneck in the development and maintenance of mobile agent systems, especially in security sensitive applications such as electronic commerce. This book introduces the concept and structure...
A mobile agent system could be attacked by malicious agents, platforms and third parties. Mobile agents simply offer greater opportunities for abuse a...
cena: 479,98

 Avoiding Project Disaster: Titanic Lessons for It Executives Kozak-Holland, Mark 9781895186734 Multi-Media Publications Inc
Avoiding Project Disaster: Titanic Lessons for It Executives

ISBN: 9781895186734 / Angielski / Miękka / 2006 / 312 str.

ISBN: 9781895186734/Angielski/Miękka/2006/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Kozak-Holland
cena: 153,11

Podprzednia  10  11  12  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia