• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5012

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Basics of Contemporary Cryptography for It Practitioners Ryabko, Boris 9789812564054 World Scientific Publishing Company
Basics of Contemporary Cryptography for It Practitioners

ISBN: 9789812564054 / Angielski / Twarda / 2005 / 208 str.

ISBN: 9789812564054/Angielski/Twarda/2005/208 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Boris Ryabko; Andrey Fionov
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques and facilities of contemporary cryptography, proving key results along the way. The contents of the first five chapters can be used for one-semester course.
The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conve...
cena: 401,61

 Security in Distributed and Networking Systems Xiao, Yang 9789812708076 World Scientific Publishing Company
Security in Distributed and Networking Systems

ISBN: 9789812708076 / Angielski / Twarda / 2007 / 512 str.

ISBN: 9789812708076/Angielski/Twarda/2007/512 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yang Xiao;Yi Pan
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing.
Provides a treatment on security issues in distributed systems and network systems. This book includes security studies in a range of systems includin...
cena: 783,64

 Secure Computer and Network Systems: Modeling, Analysis and Design Ye, Nong 9780470023242 John Wiley & Sons
Secure Computer and Network Systems: Modeling, Analysis and Design

ISBN: 9780470023242 / Angielski / Twarda / 2008 / 354 str.

ISBN: 9780470023242/Angielski/Twarda/2008/354 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Nong Ye
Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by an increasing number of computer and network applications. Yet, our dependence on computer and network systems has also exposed us to new risks, which threaten the security of, and present new challenges for protecting our assets and information on computer and network systems. The reliability of computer and network systems ultimately depends on security and quality of service (QoS) performance.

This book presents quantitative modeling and...

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...
cena: 597,78

 Security and Software for Cybercafes Esharenana E. Adomi 9781599049038 Idea Group Reference
Security and Software for Cybercafes

ISBN: 9781599049038 / Angielski / Twarda / 2008 / 360 str.

ISBN: 9781599049038/Angielski/Twarda/2008/360 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Esharenana E. Adomi
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are traveling, to access Web mail and instant messages, read newspapers, and explore other resources of the Internet. Due to the important role Internet cafes play in facilitating access to information, there is a need for their systems to have well-installed software in order to ensure smooth service delivery.
Cybercafes, which are places where Internet access is provided for free, provide the opportunity for people without access to the Internet, or who are...
cena: 922,53

 Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings Ingrid Verbauwhede 9783540747345 Springer
Cryptographic Hardware and Embedded Systems - Ches 2007: 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings

ISBN: 9783540747345 / Angielski / Miękka / 2007 / 488 str.

ISBN: 9783540747345/Angielski/Miękka/2007/488 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Ingrid Verbauwhede
CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) and held in Vienna, Austria, September 10-13, 2007. The workshop - ceived 99 submissions from 24 countries, of which the Program Committee (39 members from 15 countries) selected 31 for presentation. For the ?rst time in the history of CHES, each submission was reviewed by at least four reviewers instead of three (and at least ?ve for submissions by PC members, those now being limited to two per member) and many submitted papers have received...
CHES2007, theninthworkshoponCryptographicHardwareandEmbeddedS- tems, was sponsored by the International Association for Cryptologic Research (IACR) an...
cena: 201,24

 Security in Wireless Mesh Networks Yan Zhang Jun Zheng Honglin Hu 9780849382505 Auerbach Publications
Security in Wireless Mesh Networks

ISBN: 9780849382505 / Angielski / Twarda / 2008 / 552 str.

ISBN: 9780849382505/Angielski/Twarda/2008/552 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Yan Zhang; Jun Zheng; Honglin Hu
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services. To achieve these aims, security mechanisms are essential to ensure trusted on-going communications.

Security in Wireless Mesh Networks explores key security challenges set in diverse scenarios, as well as emerging standards that include...

Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is ...
cena: 612,21

 Nearest Neighbor Search:: A Database Perspective Apostolos N. Papadopoulos Yannis Manolopoulos A. N. Papadpoulos 9780387229638 Springer
Nearest Neighbor Search:: A Database Perspective

ISBN: 9780387229638 / Angielski / Twarda / 2004 / 170 str.

ISBN: 9780387229638/Angielski/Twarda/2004/170 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Apostolos N. Papadopoulos; Yannis Manolopoulos; A. N. Papadpoulos

Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) and nontraditional data sets (images, text, geometric objects, time-series). Examples of such emerging application domains are: Geographical Information Systems (GIS), Multimedia Information Systems, CAD/CAM, Time-Series Analysis, Medical Information Sstems, On-Line Analytical Processing (OLAP), and Data Mining. These applications pose diverse requirements with respect to the information and the operations that need to be supported. From the...

Modern applications are both data and computationally intensive and require the storage and manipulation of voluminous traditional (alphanumeric) a...

cena: 402,53

 Shifting the Security Paradigm - The Risks of Information Assurance Grayson Morgan 9783836427395 VDM Verlag
Shifting the Security Paradigm - The Risks of Information Assurance

ISBN: 9783836427395 / Angielski / Miękka / 2007 / 52 str.

ISBN: 9783836427395/Angielski/Miękka/2007/52 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Grayson Morgan
As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers be­come increasingly exposed to data quality vulnerabilities that mimic integrity failures within the Information Assurance (IA) security program. This is a re­sult of the current IA policies not having the controls needed to mitigate risks involving data quality (accuracy, relevance, timeliness, usability, complete­ness, brevity, and security) beyond the current list of limited security issues. Such narrowness of scope increases uncertainty among...
As the Department of Defense (DoD) moves to create decision superiority through the use of Network Centric Operations (NCO), decision-makers be­come ...
cena: 195,77

 VoIP Network Security and Forensic Models Using Patterns Pelaez, Juan C. 9783836428132 VDM Verlag
VoIP Network Security and Forensic Models Using Patterns

ISBN: 9783836428132 / Angielski / Miękka / 2007 / 204 str.

ISBN: 9783836428132/Angielski/Miękka/2007/204 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Juan C. Pelaez
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred.
Many of these attacks occur in similar ways in different contexts or environ­ments. Generic solutions to...
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP netw...
cena: 316,96

 Interactive Information Retrieval in Digital Environments Hong Xie 9781599042404 Igi Publishing
Interactive Information Retrieval in Digital Environments

ISBN: 9781599042404 / Angielski / Twarda / 2008 / 378 str.

ISBN: 9781599042404/Angielski/Twarda/2008/378 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Hong Xie
The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web search engines, online databases, and online public access catalogs. Interactive Information Retrieval in Digital Environments provides theoretical framework in understanding the nature of information retrieval, and offers implications for the design and evolution of interactive information retrieval systems. Interactive Information Retrieval in Digital Environments includes the integration of existing frameworks on user-oriented information...
The emergence of the Internet allows millions of people to use a variety of electronic information retrieval systems, such as: digital libraries, Web ...
cena: 510,39

 Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions Subramanian, Ramesh 9781599048048 IRM Press
Computer Security, Privacy, and Politics: Current Issues, Challenges, and Solutions

ISBN: 9781599048048 / Angielski / Twarda / 2008 / 358 str.

ISBN: 9781599048048/Angielski/Twarda/2008/358 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ramesh Subramanian
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations and habits, with major political and social implications. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions connects privacy and politics, offering a point-in-time review of recent developments of computer security, with a...
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms,...
cena: 512,26

 Multimedia Forensics and Security Chang-Tsun Li 9781599048697 Information Science Reference
Multimedia Forensics and Security

ISBN: 9781599048697 / Angielski / Twarda / 2008 / 418 str.

ISBN: 9781599048697/Angielski/Twarda/2008/418 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Chang-Tsun Li
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers, organizations, and governments worldwide. "Multimedia Forensics and Security" provides an in-depth treatment of advancements in the emerging field of multimedia forensics and security by tackling challenging issues such as digital watermarking for copyright...
As information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication network...
cena: 922,53

 Beyond Centralised Search Engines- An Agent-Based Filtering Framework Dragan Milosevic 9783836412223 VDM Verlag Dr. Mueller E.K.
Beyond Centralised Search Engines- An Agent-Based Filtering Framework

ISBN: 9783836412223 / Angielski / Miękka / 2007 / 312 str.

ISBN: 9783836412223/Angielski/Miękka/2007/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dragan Milosevic
cena: 316,96

 Securing Peer-to-Peer Video Conferences - From concepts to implementations Fuwen Liu 9783836452823 VDM Verlag Dr. Mueller E.K.
Securing Peer-to-Peer Video Conferences - From concepts to implementations

ISBN: 9783836452823 / Angielski / Miękka / 2007 / 168 str.

ISBN: 9783836452823/Angielski/Miękka/2007/168 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fuwen Liu
cena: 316,96

 Beautiful Security: Leading Security Experts Explain How They Think Oram, Andy 9780596527488 O'Reilly Media
Beautiful Security: Leading Security Experts Explain How They Think

ISBN: 9780596527488 / Angielski / Miękka / 2009 / 302 str.

ISBN: 9780596527488/Angielski/Miękka/2009/302 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
William Hurley; John Viega

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same.

Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:

  • The underground economy for personal information: how it works, the relationships among criminals,...

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology dem...

cena: 164,92

 Handbook of Research on Information Security and Assurance Jatinder N D Gupta                       Sushil K Sharma                          Jatinder N. D. Gupta 9781599048550 Information Science Reference
Handbook of Research on Information Security and Assurance

ISBN: 9781599048550 / Angielski / Twarda / 2008 / 586 str.

ISBN: 9781599048550/Angielski/Twarda/2008/586 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jatinder N D Gupta;Sushil K Sharma; Jatinder N. D. Gupta
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities associated with technology. Attacks on computer systems are increasing in sophistication and potential devastation more than ever before. As such, organizations need to stay abreast of the latest protective measures and services to prevent cyber attacks. The Handbook of Research on Information Security and Assurance offers comprehensive definitions and explanations on topics such as firewalls, information warfare, encryption standards, and social...
While emerging information and internet ubiquitous technologies provide tremendous positive opportunities, there are still numerous vulnerabilities as...
cena: 1358,16

 Network Security: Know It All James Joshi James B. D. Joshi 9780123744630 Morgan Kaufmann Publishers
Network Security: Know It All

ISBN: 9780123744630 / Angielski / Twarda / 2008 / 350 str.

ISBN: 9780123744630/Angielski/Twarda/2008/350 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
James Joshi; James B. D. Joshi
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.

Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.

* Chapters contributed by recognized...

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the fi...
cena: 293,81

 Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast Hope, Paco 9780596514839 O'Reilly Media
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

ISBN: 9780596514839 / Angielski / Miękka / 2008 / 314 str.

ISBN: 9780596514839/Angielski/Miękka/2008/314 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc security assessments, these recipes are repeatable, concise, and systematic-perfect for integrating into your regular test suite.

Recipes cover the basics from observing messages between clients and servers to multi-phase...

Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in ...

cena: 154,10

 It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement Chorafas, Dimitris N. 9781420086171 Auerbach Publications
It Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement

ISBN: 9781420086171 / Angielski / Twarda / 2008 / 305 str.

ISBN: 9781420086171/Angielski/Twarda/2008/305 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Dr Dimitris N. Chorafas

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practices, focused auditing activities, a functioning system of internal control, and a close watch by the board s audit committee and CEO. Written as a contribution to the accounting and auditing professions as well as to IT practitioners, IT Auditing and Sarbanes-Oxley Compliance: Key Strategies for Business Improvement links these two key business strategies and explains how to perform IT auditing in a comprehensive and strategic...

Information technology auditing and Sarbanes-Oxley compliance have several overlapping characteristics. They both require ethical accounting practi...

cena: 612,21

 Coastal Lagoons: Critical Habitats of Environmental Change Kennish, Michael J. 9781420088304 CRC
Coastal Lagoons: Critical Habitats of Environmental Change

ISBN: 9781420088304 / Angielski / Twarda / 2010 / 568 str.

ISBN: 9781420088304/Angielski/Twarda/2010/568 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Michael J. Kennish; Hans W. Paerl

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agricultural, and urban waste, overuse from fisheries, aquaculture, transportation, energy production, and other human activities. The features that make coastal lagoons vital ecosystems underline the importance of sound management strategies for long-term environmental and resource sustainability. Written by an internationally renowned group of contributors, Coastal Lagoons: Critical Habitats of Environmental Change examines the...

Dynamic and productive ecosystems, coastal lagoons play an important role in local economies and often bear the brunt of coastal development, agric...

cena: 1004,03

Podprzednia  13  14  15  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia