
ilość książek w kategorii: 5012
![]() |
CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives
ISBN: 9781420089103 / Angielski / Twarda / 2008 / 314 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A companion volume to the highly touted "CISO Handbook," this bookpresents tools that empower organizations to identify those intangible negative influencers of security that plague most organizations, and provides further techniques for security professionals to identify, minimize, and overcome these pitfalls within their own customized situations. The book also discusses some proactive techniques that CISOs can utilize in order to effectively secure challenging work environments. Reflecting the experience and solutions of those that are in the trenches of modern organizations, this volume...
A companion volume to the highly touted "CISO Handbook," this bookpresents tools that empower organizations to identify those intangible negative infl...
|
cena:
357,48 |
![]() |
Mobile and Wireless Networks Security - Proceedings of the Mwns 2008 Workshop
ISBN: 9789812833259 / Angielski / Miękka / 2008 / 88 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Wireless and mobile networks have undergone a tremendous evolution since their start. Presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore, this title features the research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks.
Wireless and mobile networks have undergone a tremendous evolution since their start. Presented at the Mobile and Wireless Networks Security (MWNS) 20...
|
cena:
347,74 |
![]() |
Securing Computer Networks: Anaysis Design and Implementation
ISBN: 9780849318689 / Angielski / Twarda / 1999 / 392 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the authors' earlier work, Computer System and Network Security, this new book addresses important concerns regarding network security. It contains new chapters on World Wide Web security issues, secure electronic commerce, incident response, as well as two new appendices on PGP and UNIX security fundamentals.
This updated guide presents expert information on analyzing, designing, and implementing all aspects of computer network security. Based on the author...
|
cena:
195,86 |
![]() |
Electronic Resources: Selection and Bibliographic Control
ISBN: 9781560248477 / Angielski / Twarda / 1996 / 268 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The universe of electronic resources is indeed diverse, expansive, intimidating, and unstructured compared to the finite, prepackaged print world upon which the information delivery infrastructure has been constructed. Electronic Resources: Selection and Bibliographic Control addresses the resultant concerns of information professionals as they struggle to define, select, and control electronic resources in libraries and information centers today. This book offers readers an overview of issues and provides a common ground for deliberations and decisionmaking. Librarians and students...
The universe of electronic resources is indeed diverse, expansive, intimidating, and unstructured compared to the finite, prepackaged print world upon...
|
cena:
426,05 |
![]() |
Database-Driven Web Sites
ISBN: 9780789017390 / Angielski / Miękka / 2002 / 133 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet your clients? demand for information?use Database-Driven Web Sites to help you find the dynamic program that will get the job done with ease. This book contains profiles of successful content delivery solutions in a variety of library situations, from academic to governmental, and covers many associated elements, such as web site redesign, digitization, and electronic access to archival information. Plentiful illustrations and straightforward... A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet y... |
cena:
161,57 |
![]() |
Database-Driven Web Sites
ISBN: 9780789017383 / Angielski / Twarda / 2002 / 133 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet your clients? demand for information?use Database-Driven Web Sites to help you find the dynamic program that will get the job done with ease. This book contains profiles of successful content delivery solutions in a variety of library situations, from academic to governmental, and covers many associated elements, such as web site redesign, digitization, and electronic access to archival information. Plentiful illustrations and straightforward... A reference you?ll turn to whenever you need a practical solution to your online content delivery problems
Don't depend on static HTML to meet y... |
cena:
269,33 |
![]() |
High-Level Subject Access Tools and Techniques in Internet Cataloging
ISBN: 9780789020253 / Angielski / Miękka / 2003 / 272 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and early development of high-level subject access. It examines Web tools and traditionally maintained library structures that facilitate the automated relation of resources to high-level subject categories based on the descriptive metadata that already exists in traditional library records. It includes a research study of high-level subject browse structures, as well as hands-on reports of actual projects and development activities and an examination... Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and ea... |
cena:
161,57 |
![]() |
Digital Rights Management for E-Commerce Systems
ISBN: 9781605661186 / Angielski / Twarda / 2008 / 406 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With the proliferation of Internet access, e-commerce systems are increasingly important as a new and effective method to distribute, transact, and exploit digital multimedia content. With the growth of multimedia content, management and protection become a critical issue, creating a need for digital rights management systems. Digital Rights Management for E-Commerce Systems highlights innovative technologies used for the design and implementation of advanced e-commerce systems facilitating digital rights management and protection. Through comprehensive coverage of the full range of...
With the proliferation of Internet access, e-commerce systems are increasingly important as a new and effective method to distribute, transact, and ex...
|
cena:
995,01 |
![]() |
Using Automated Fix Generation to Mitigate SQL Injection Vulnerabilities
ISBN: 9783836464963 / Angielski / Miękka / 2008 / 80 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software security practitioners, a solution for correctly removing SQLIVs that does not require security expertise is desirable. In this paper, an automated fix generation algorithm for removing SQLIVs by replacing SQL statements with prepared SQL statements is described. Automated fix generation is a type of automated code generation that analyzes project artifacts containing faults and uses the analysis to generate fault free alternative or replacement...
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities (SQLIVs). Since most developers are not experienced software se...
|
cena:
228,40 |
![]() |
Efficient Service Discovery in Large-scale Mobile Agent Systems
ISBN: 9783639013856 / Angielski / Miękka / 2008 / 120 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
228,40 |
![]() |
Real-Time Systems: Formal Specification and Automatic Verification
ISBN: 9780521883337 / Angielski / Twarda / 2008 / 320 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 milliseconds in a crash. There are many embedded safety-critical applications and each requires real-time specification techniques. This text introduces three of these techniques, based on logic and automata: duration calculus, timed automata, and PLC-automata. The techniques are brought together to form a seamless design flow, from real-time requirements specified in the duration calculus; via designs specified by PLC-automata; and into source code for...
Real-time systems need to react to certain input stimuli within given time bounds. For example, an airbag in a car has to unfold within 300 millisecon...
|
cena:
391,42 |
![]() |
IPv6 Security
ISBN: 9781587055942 / Angielski / Miękka / 2008 / 576 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. IPv6 Security Protection measures for the next Internet Protocol As the world s networks migrate to the IPv6 protocol, networking professionals need a clearer understanding of the security risks, threats, and challenges this transition presents. In IPv6 Security, two of the world s leading Internet security practitioners review each potential security issue introduced by IPv6 networking and present today s best solutions. IPv6 Security offers guidance for avoiding security problems prior to widespread IPv6 deployment. The book covers every component...
IPv6 Security Protection measures for the next Internet Protocol As the world s networks migrate to the IPv6 protocol, netwo...
|
cena:
276,22 |
![]() |
Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection
ISBN: 9781599047089 / Angielski / Twarda / 2008 / 476 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algorithms and approaches have been developed and proposed over the last decade, the statistically-based method remains the most common approach to anomaly intrusion detection.
Intrusion detection and protection is a key component in the framework of the computer and network security area. Although various classification algo...
|
cena:
845,50 |
![]() |
Cisco Access Lists Field Guide
ISBN: 9780072123357 / Angielski / Miękka / 2000 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the network manager's easy to use guide for configuring access lists. It offers examples, describes potential pitfalls and how to avoid them, and explains access lists formats.
This is the network manager's easy to use guide for configuring access lists. It offers examples, describes potential pitfalls and how to avoid them, ...
|
cena:
137,90 |
![]() |
Security Monitoring: Proven Methods for Incident Detection on Enterprise Networks
ISBN: 9780596518165 / Angielski / Miękka / 2009 / 246 str. Termin realizacji zamówienia: ok. 30 dni roboczych. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrat... |
cena:
185,55 |
![]() |
Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
ISBN: 9781439801963 / Angielski / Twarda / 2011 / 204 str. Termin realizacji zamówienia: ok. 22 dni roboczych. As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the... As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services... |
cena:
430,95 |
![]() |
Gray Hat Python
ISBN: 9781593271923 / Angielski / Miękka / 2009 / 216 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin... Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly,... |
cena:
191,18 |
![]() |
Information Warfare
ISBN: 9781848210943 / Angielski / Twarda / 2009 / 303 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between...
This book introduces policy, government, and security professionals to the concept of -information warfare, - covering its evolution over the last dec...
|
cena:
768,02 |
![]() |
Cross-Disciplinary Advances in Human Computer Interaction: User Modeling, Social Computing, and Adaptive Interfaces
ISBN: 9781605661421 / Angielski / Twarda / 2009 / 472 str. Termin realizacji zamówienia: ok. 30 dni roboczych. It is becoming increasingly necessary to systematically take into account human interaction and activity with the completely renewed social and cultural environments that such digital environments and interfaces are now capable of delivering.
It is becoming increasingly necessary to systematically take into account human interaction and activity with the completely renewed social and cultur...
|
cena:
995,01 |
![]() |
Social Implications of Data Mining and Information Privacy: Interdisciplinary Frameworks and Solutions
ISBN: 9781605661964 / Angielski / Twarda / 2009 / 344 str. Termin realizacji zamówienia: ok. 30 dni roboczych. As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researchers, and professionals of the discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.
As data mining is one of the most rapidly changing disciplines with new technologies and concepts continually under development, academicians, researc...
|
cena:
995,01 |