
ilość książek w kategorii: 5022
![]() |
Policing America's Educational Systems
ISBN: 9781498784986 / Angielski / Miękka / 2019 / 230 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
204,81 |
![]() |
Cyber Strategy: Risk-Driven Security and Resiliency
ISBN: 9780367339456 / Angielski / Miękka / 2020 / 200 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
204,81 |
![]() |
Business Recovery and Continuity in a Mega Disaster: Cybersecurity Lessons Learned from the Covid-19 Pandemic
ISBN: 9780367685737 / Angielski / Miękka / 2022 / 214 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
204,81 |
![]() |
Transforming Cybersecurity with Machine Learning
ISBN: 9781041171683 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
204,81 |
![]() |
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs
ISBN: 9780596000455 / Angielski / Miękka / 2001 / 788 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet... Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business... |
cena:
205,33 |
![]() |
Mastering FreeBSD and OpenBSD Security
ISBN: 9780596006266 / Angielski / Miękka / 2005 / 445 str. Termin realizacji zamówienia: ok. 30 dni roboczych. FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named... FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide sig... |
cena:
205,33 |
![]() |
User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks
ISBN: 9781443847964 / Angielski / Twarda / 2013 / 185 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc Networks (MANets), which offer attractive solutions for services that need flexible setup as well as dynamic and low cost wireless connectivity. However, the growing trend outlined above also raises serious concerns over Identity Management (IM) due to a dramatic increase in identity theft. The problem is even greater in service-oriented...
The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-h...
|
cena:
205,33 |
![]() |
Security and Usability: Designing Secure Systems That People Can Use
ISBN: 9780596008277 / Angielski / Miękka / 2005 / 740 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable... Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts h... |
cena:
205,33 |
![]() |
Crafting an Information Security Playbook
ISBN: 9781491949405 / Angielski / Miękka / 2015 / 276 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec... Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demon... |
cena:
205,33 |
![]() |
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
ISBN: 9781491902332 / Angielski / Miękka / 2015 / 296 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation. A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars. If you're part of a team creating applications for Internet-connected... This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people tryin... |
cena:
205,33 |
![]() |
Krisenfall Ransomware
ISBN: 9783658416133 / Niemiecki / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige Reaktion im Krisenfall und die Möglichkeiten zur Prävention. Illustriert durch zahlreiche Screenshots von Erpresserschreiben, Darknetseiten & Verhandlungschats. Mit Gastbeiträgen von N. Weyerstall, Dr. Malek und C. Kurtz sowie von betroffenen Unternehmen. Dieses Buch ist mehr als nur eine Notfallanleitung für den eingetretenen Krisenfall. Um die eigene Verteidigung zu planen, lohnt es sich, den Ernstfall gedanklich durchzuspielen. Anhand von mehr als 50 bearbeiteten Angriffen auf deutsche Firmen erörtern die Autoren das technische Vorgehen von Ransomwaregruppen, die richtige... |
cena:
206,88 |
![]() |
Cyber Crisis Management: Das Praxishandbuch Zu Krisenmanagement Und Krisenkommunikation
ISBN: 9783658434649 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
206,88 |
![]() |
The CISO's Guide to Surviving Machiavellian Politics
ISBN: 9798388107046 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
206,97 |
![]() |
Cyber Forensics and Investigation on Smart Devices
ISBN: 9789815179590 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
206,97 |
![]() |
Network Reliability and Algebraic Structures
ISBN: 9780198533863 / Angielski / Twarda / 1991 / 154 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Networks of computer systems, distribution systems, and telecommunication systems play an increasingly important role in our lives. This book is concerned with analysing and assessing the reliability of such networks whose components are prone to possible failure.
The field of network reliability has expanded rapidly to provide various mathematical models and computational procedures. In this book the emphasis is on identifying a number of algebraic structures that serve to unify the study of networks, and to suggest new techniques and procedures for analysing the probabilistic behaviour of... Networks of computer systems, distribution systems, and telecommunication systems play an increasingly important role in our lives. This book is conce...
|
cena:
207,27 |
![]() |
Security Yearbook 2025: A History and Directory of the It Security Industry
ISBN: 9781394334865 / Angielski Termin realizacji zamówienia: ok. 22 dni roboczych. |
cena:
207,30 |
![]() |
Pfsense 2 Cookbook
ISBN: 9781849514866 / Angielski / Miękka / 2011 / 252 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment's security needs. pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With...
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versa...
|
cena:
207,98 |
![]() |
Nmap 6: Network Exploration and Security Auditing Cookbook
ISBN: 9781849517485 / Angielski / Miękka / 2012 / 318 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
|
cena:
207,98 |
![]() |
Android Application Security Essentials
ISBN: 9781849515603 / Angielski / Miękka / 2013 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
207,98 |
![]() |
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
ISBN: 9781849685962 / Angielski / Miękka / 2013 / 324 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments. "Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must...
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It ...
|
cena:
207,98 |