• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5012

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives Collette, Ron 9781420089103 Auerbach Publications
CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

ISBN: 9781420089103 / Angielski / Twarda / 2008 / 314 str.

ISBN: 9781420089103/Angielski/Twarda/2008/314 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Michael Gentile; Ron Collette; Skye Gentile
A companion volume to the highly touted "CISO Handbook," this bookpresents tools that empower organizations to identify those intangible negative influencers of security that plague most organizations, and provides further techniques for security professionals to identify, minimize, and overcome these pitfalls within their own customized situations. The book also discusses some proactive techniques that CISOs can utilize in order to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume...
A companion volume to the highly touted "CISO Handbook," this bookpresents tools that empower organizations to identify those intangible negative infl...
cena: 357,48

 Mobile and Wireless Networks Security - Proceedings of the Mwns 2008 Workshop Laurent-Naknavicius, Maryline 9789812833259 World Scientific Publishing Company
Mobile and Wireless Networks Security - Proceedings of the Mwns 2008 Workshop

ISBN: 9789812833259 / Angielski / Miękka / 2008 / 88 str.

ISBN: 9789812833259/Angielski/Miękka/2008/88 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Maryline Laurent-Maknavicius;Hakima Chaouchi
Wireless and mobile networks have undergone a tremendous evolution since their start. Presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore, this title features the research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks.
Wireless and mobile networks have undergone a tremendous evolution since their start. Presented at the Mobile and Wireless Networks Security (MWNS) 20...
cena: 347,74

 Securing Computer Networks: Anaysis Design and Implementation Fisch, Eric A. 9780849318689 Taylor & Francis
Securing Computer Networks: Anaysis Design and Implementation

ISBN: 9780849318689 / Angielski / Twarda / 1999 / 392 str.

ISBN: 9780849318689/Angielski/Twarda/1999/392 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Eric A. Fisch;Gregory B. White
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the author...
cena: 195,86

 Electronic Resources: Selection and Bibliographic Control W. Pattie, Ling Yuh 9781560248477 Taylor & Francis
Electronic Resources: Selection and Bibliographic Control

ISBN: 9781560248477 / Angielski / Twarda / 1996 / 268 str.

ISBN: 9781560248477/Angielski/Twarda/1996/268 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Ling Yuh W Pattie;Bonnie J Cox
The universe of electronic resources is indeed diverse, expansive, intimidating, and unstructured compared to the finite, prepackaged print world upon which the information delivery infrastructure has been constructed. Electronic Resources: Selection and Bibliographic Control addresses the resultant concerns of information professionals as they struggle to define, select, and control electronic resources in libraries and information centers today. This book offers readers an overview of issues and provides a common ground for deliberations and decisionmaking.

Librarians and students...
The universe of electronic resources is indeed diverse, expansive, intimidating, and unstructured compared to the finite, prepackaged print world upon...
cena: 426,05

 Database-Driven Web Sites Kristin Antelman 9780789017390 Taylor & Francis
Database-Driven Web Sites

ISBN: 9780789017390 / Angielski / Miękka / 2002 / 133 str.

ISBN: 9780789017390/Angielski/Miękka/2002/133 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kristin Antelman
A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet your clients? demand for information?use Database-Driven Web Sites to help you find the dynamic program that will get the job done with ease. This book contains profiles of successful content delivery solutions in a variety of library situations, from academic to governmental, and covers many associated elements, such as web site redesign, digitization, and electronic access to archival information. Plentiful illustrations and straightforward...
A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet y...
cena: 161,57

 Database-Driven Web Sites Kristin Antelman 9780789017383 Taylor & Francis
Database-Driven Web Sites

ISBN: 9780789017383 / Angielski / Twarda / 2002 / 133 str.

ISBN: 9780789017383/Angielski/Twarda/2002/133 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kristin Antelman
A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet your clients? demand for information?use Database-Driven Web Sites to help you find the dynamic program that will get the job done with ease. This book contains profiles of successful content delivery solutions in a variety of library situations, from academic to governmental, and covers many associated elements, such as web site redesign, digitization, and electronic access to archival information. Plentiful illustrations and straightforward...
A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet y...
cena: 269,33

 High-Level Subject Access Tools and Techniques in Internet Cataloging Judith (University Of Michigan, Ann Arbor, MI, USA) Ahronheim 9780789020253 Taylor & Francis
High-Level Subject Access Tools and Techniques in Internet Cataloging

ISBN: 9780789020253 / Angielski / Miękka / 2003 / 272 str.

ISBN: 9780789020253/Angielski/Miękka/2003/272 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
USA) Ahronhei MI Ann Arbor Judith (University Of Michigan
Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and early development of high-level subject access. It examines Web tools and traditionally maintained library structures that facilitate the automated relation of resources to high-level subject categories based on the descriptive metadata that already exists in traditional library records. It includes a research study of high-level subject browse structures, as well as hands-on reports of actual projects and development activities and an examination...
Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and ea...
cena: 161,57

 Digital Rights Management for E-Commerce Systems Lambros Drossos Dimitrios Tsolis Spyros Sioutas 9781605661186 Information Science Reference
Digital Rights Management for E-Commerce Systems

ISBN: 9781605661186 / Angielski / Twarda / 2008 / 406 str.

ISBN: 9781605661186/Angielski/Twarda/2008/406 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Lambros Drossos; Dimitrios Tsolis; Spyros Sioutas
With the proliferation of Internet access, e-commerce systems are increasingly important as a new and effective method to distribute, transact, and exploit digital multimedia content. With the growth of multimedia content, management and protection become a critical issue, creating a need for digital rights management systems. Digital Rights Management for E-Commerce Systems highlights innovative technologies used for the design and implementation of advanced e-commerce systems facilitating digital rights management and protection. Through comprehensive coverage of the full range of...
With the proliferation of Internet access, e-commerce systems are increasingly important as a new and effective method to distribute, transact, and ex...
cena: 995,01

 Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities Stephen Thomas 9783836464963 VDM Verlag
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities

ISBN: 9783836464963 / Angielski / Miękka / 2008 / 80 str.

ISBN: 9783836464963/Angielski/Miękka/2008/80 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Stephen Thomas
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
cena: 228,40

 Efficient Service Discovery in Large-scale Mobile Agent Systems Hentrich, Thomas 9783639013856 VDM VERLAG DR. MULLER AKTIENGESELLSCHAFT & CO
Efficient Service Discovery in Large-scale Mobile Agent Systems

ISBN: 9783639013856 / Angielski / Miękka / 2008 / 120 str.

ISBN: 9783639013856/Angielski/Miękka/2008/120 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas Hentrich; Wilhelm R. Rossak
cena: 228,40

 Real-Time Systems: Formal Specification and Automatic Verification Olderog, Ernst-Rüdiger 9780521883337 CAMBRIDGE UNIVERSITY PRESS
Real-Time Systems: Formal Specification and Automatic Verification

ISBN: 9780521883337 / Angielski / Twarda / 2008 / 320 str.

ISBN: 9780521883337/Angielski/Twarda/2008/320 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
E-. R. Olderog; H. Dierks
Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 milliseconds in a crash. There are many embedded safety-critical applications and each requires real-time specification techniques. This text introduces three of these techniques, based on logic and automata: duration calculus, timed automata, and PLC-automata. The techniques are brought together to form a seamless design flow, from real-time requirements specified in the duration calculus; via designs specified by PLC-automata; and into source code for...
Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 millisecon...
cena: 391,42

 IPv6 Security Scott Hogg Eric Vyncke 9781587055942 Cisco Press
IPv6 Security

ISBN: 9781587055942 / Angielski / Miękka / 2008 / 576 str.

ISBN: 9781587055942/Angielski/Miękka/2008/576 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Scott Hogg; Eric Vyncke
IPv6 Security

Protection measures for the next Internet Protocol

As the world s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today s best solutions.

IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component...
IPv6 Security

Protection measures for the next Internet Protocol

As the world s networks migrate to the IPv6 protocol, netwo...
cena: 276,22

 Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection Wang, Yun 9781599047089 Information Science Reference
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection

ISBN: 9781599047089 / Angielski / Twarda / 2008 / 476 str.

ISBN: 9781599047089/Angielski/Twarda/2008/476 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yun Wang
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
cena: 845,50

 Cisco Access Lists Field Guide Gilbert Held, Kent Hundley 9780072123357 McGraw-Hill Education - Europe
Cisco Access Lists Field Guide

ISBN: 9780072123357 / Angielski / Miękka / 2000 / 288 str.

ISBN: 9780072123357/Angielski/Miękka/2000/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gilbert Held;Kent Hundley
This is the network manager's easy to use guide for configuring access lists. It offers examples, describes potential pitfalls and how to avoid them, and explains access lists formats.
This is the network manager's easy to use guide for configuring access lists. It offers examples, describes potential pitfalls and how to avoid them, ...
cena: 137,90

 Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks Fry, Chris 9780596518165 O'Reilly Media
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks

ISBN: 9780596518165 / Angielski / Miękka / 2009 / 246 str.

ISBN: 9780596518165/Angielski/Miękka/2009/246 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Martin Nystrom; Chris Fry

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them.

Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. These steps will help...

How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat...

cena: 185,55

 Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Macaulay, Tyson 9781439801963 Auerbach Publications
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

ISBN: 9781439801963 / Angielski / Twarda / 2011 / 204 str.

ISBN: 9781439801963/Angielski/Twarda/2011/204 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Macaulay Tyson

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the...

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services...

cena: 430,95

 Gray Hat Python Justin Seitz 9781593271923 No Starch Press,US
Gray Hat Python

ISBN: 9781593271923 / Angielski / Miękka / 2009 / 216 str.

ISBN: 9781593271923/Angielski/Miękka/2009/216 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Justin Seitz

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin...

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,...

cena: 191,18

 Information Warfare Daniel Ventre 9781848210943 Wiley-Iste
Information Warfare

ISBN: 9781848210943 / Angielski / Twarda / 2009 / 303 str.

ISBN: 9781848210943/Angielski/Twarda/2009/303 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Daniel Ventre
This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between...
This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last dec...
cena: 768,02

 Cross-Disciplinary Advances in Human Computer Interaction: User Modeling, Social Computing, and Adaptive Interfaces Zaphiris, Panayiotis 9781605661421 Information Science Reference
Cross-Disciplinary Advances in Human Computer Interaction: User Modeling, Social Computing, and Adaptive Interfaces

ISBN: 9781605661421 / Angielski / Twarda / 2009 / 472 str.

ISBN: 9781605661421/Angielski/Twarda/2009/472 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Panayiotis Zaphiris
It is becoming increasingly necessary to systematically take into account human interaction and activity with the completely renewed social and cultural environments that such digital environments and interfaces are now capable of delivering.
It is becoming increasingly necessary to systematically take into account human interaction and activity with the completely renewed social and cultur...
cena: 995,01

 Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions Eyob, Ephrem 9781605661964 Information Science Reference
Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions

ISBN: 9781605661964 / Angielski / Twarda / 2009 / 344 str.

ISBN: 9781605661964/Angielski/Twarda/2009/344 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Ephrem Eyob
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researc...
cena: 995,01

Podprzednia  16  17  18  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia