
ilość książek w kategorii: 5012
![]() |
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
ISBN: 9780596523022 / Angielski / Miękka / 2009 / 264 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime securi... |
cena:
115,56 |
![]() |
Public Libraries and Internet Service Roles
ISBN: 9780838935767 / Angielski / Miękka / 2009 / 112 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The Internet is not a one-way street in terms of library service as it challenges any traditional notion of its use for collecting or managing information. The information is constantly changing. It is not a static and reliable source like a book, nor is the content necessarily correct all of the time. In this resource, authors Charles McClure and Paul T. Jaeger speak to the ways in which the Internet has had more impact on public libraries than any other technology since the creation of the book. The issues presented are vital to library service, planning, evaluation, research and education...
The Internet is not a one-way street in terms of library service as it challenges any traditional notion of its use for collecting or managing informa...
|
cena:
191,02 |
![]() |
Securing Library Technology: A How-to-do-it Manual
ISBN: 9781555706395 / Angielski / Miękka / 2009 / 245 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting your library's technology assets against the growing array of threats--from viruses and worms to hackers, system failures, and natural disasters. Here is a step-by-step, easy-to-implement guide for securing servers, systems, and networks against both internal and external threats. Beginning with the fundamentals, the authors will guide you through the steps necessary to build a comprehensive security plan. You will learn how to take a detailed...
A must-have preparedness handbook for every library and information center, this nontechnical guide offers you comprehensive strategy for protecting y...
|
cena:
383,94 |
![]() |
Evaluating Information Retrieval Systems: The Probe Program
ISBN: 9780313205217 / Angielski / Twarda / 1979 / 168 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Describes the history and methodology of computer system evaluations which were examined in order to determine the best way to conduct the evaluation of PROBE, the ERIC computer retrieval search service.
Describes the history and methodology of computer system evaluations which were examined in order to determine the best way to conduct the evaluation ...
|
cena:
283,55 |
![]() |
Illustrative Computer Programming for Libraries: Selected Examples for Information Specialists
ISBN: 9780313221514 / Angielski / Twarda / 1981 / 129 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
335,11 |
![]() |
Hypertext and the Technology of Conversation: Orderly Situational Choice
ISBN: 9780313289620 / Angielski / Twarda / 1993 / 280 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book explores the usefulness of looking at very small aspects of human behavior in order to understand computer-human interaction difficulties with hypertext. The focus is on both mechanical actions and talk as social action. While this approach has been used fruitfully to study human-human interaction, Gray has constructed a unique study of human interaction with machines.
This book explores the usefulness of looking at very small aspects of human behavior in order to understand computer-human interaction difficulties... |
cena:
360,89 |
![]() |
Making Sense of Data II
ISBN: 9780470222805 / Angielski / Miękka / 2009 / 308 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This title provides a general end-to-end discussion concerning the process of translating raw data to scientific and business decisions. The reader's ability to find patterns in data will be greatly enhanced due to the book's combination of statistical learning with powerful visualisation techniques.
This title provides a general end-to-end discussion concerning the process of translating raw data to scientific and business decisions. The reader's ...
|
cena:
500,43 |
![]() |
Information Systems and Networks: Eleventh Annual Symposium, March 27-29, 1974
ISBN: 9780837177175 / Angielski / Twarda / 1975 / 200 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
283,55 |
![]() |
Fuzzing for Software Security Testing and Quality Assurance
ISBN: 9781596932142 / Angielski / Twarda / 2008 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and patch flaws before harmful viruses, worms, and Trojans can rampage systems. Traditional software programmers and testers learn how to make fuzzing a standard practice.
Offering a powerful new tool to build secure, high-quality software, this resource helps developers think like a software cracker so they can find and...
|
cena:
408,12 |
![]() |
Cryptography : An Introduction
ISBN: 9780821829868 / Angielski / Miękka / 2002 Termin realizacji zamówienia: ok. 30 dni roboczych. Learning about cryptography requires examining fundamental issues about information security. Questions abound and answering them requires an understanding of basic cryptography. This book, written by Russian cryptographers, explains those basics. Chapters are independent and can be read in any order. The introduction gives a general description of all the main notions of modern cryptography: a cipher, a key, security, an electronic digital signature, a cryptographic protocol, etc. Other chapters delve more deeply into this material. This text should be suitable for advanced high school...
Learning about cryptography requires examining fundamental issues about information security. Questions abound and answering them requires an understa...
|
cena:
259,58 |
![]() |
Grid Computing: Infrastructure, Service, and Applications
ISBN: 9781420067668 / Angielski / Twarda / 2009 / 528 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Identifies Recent Technological Developments Worldwide The field of grid computing has made rapid progress in the past few years, evolving and developing in almost all areas, including concepts, philosophy, methodology, and usages. Grid Computing: Infrastructure, Service, and Applications reflects the recent advances in this field, covering the research aspects that involve infrastructure, middleware, architecture, services, and applications. Grid Systems Across the Globe The first section of... Identifies Recent Technological Developments Worldwide The field of grid computing has made rapid progress in the p... |
cena:
979,55 |
![]() |
Finding Out About: A Cognitive Perspective on Search Engine Technology and the WWW
ISBN: 9780521734462 / Angielski / Miękka / 2008 / 384 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The World Wide Web is rapidly filling with more text than anyone could have imagined a short time ago. However, the task of determining which data is relevant has become appreciably harder. In this original new work Richard Belew brings a cognitive science perspective to the study of information as a computer science discipline. He introduces the idea of Finding Out About (FOA), the process of actively seeking out information relevant to a topic of interest. Belew describes all facets of FOA, ranging from creating a good characterization of what the user seeks to evaluating the successful...
The World Wide Web is rapidly filling with more text than anyone could have imagined a short time ago. However, the task of determining which data is ...
|
cena:
440,76 |
![]() |
Information Security Management Handbook, Volume 3
ISBN: 9781420090925 / Angielski / Twarda / 2009 / 392 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on which all IT security programs and certifications are created. Considered the gold-standard reference of information security, the Handbook includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the increasingly fast pace of change in the technology field, this book is revised annually, keeping IT professionals updated and current. Volume 3 adds a... A compilation of the fundamental knowledge, skills, techniques, and tools required by all security professionals, this text forms the basis on whic... |
cena:
710,17 |
![]() |
Public-Key Cryptography
ISBN: 9780821833650 / Angielski / Twarda / 2005 Termin realizacji zamówienia: ok. 30 dni roboczych. Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography held at the Joint Mathematics Meetings (Baltimore). This book provides an introduction and survey on public-key cryptography for those with
Presents a collection of articles that grew out of an expository and tutorial conference on public-key cryptography held at the Joint Mathematics Meet...
|
cena:
543,65 |
![]() |
Cisco ASA Configuration
ISBN: 9780071622691 / Angielski / Miękka / 2009 / 752 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of information technology professionals or writing books, Richard's communication skills are unsurpassed. As information technology professionals we are faced with overcoming challenges every day...Cisco ASA Configuration is a great reference and tool for answering our challenges." --From the Foreword by Steve Marcinek (CCIE 7225), Systems Engineer, Cisco Systems A hands-on guide to implementing Cisco ASA Configure and... "Richard Deal's gift of making difficult technology concepts understandable has remained constant. Whether it is presenting to a room of informatio... |
cena:
312,13 |
![]() |
Collaborative Computer Security and Trust Management
ISBN: 9781605664149 / Angielski / Twarda / 2009 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful security threats. Collaborative Computer Security and Trust Management combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field. Practitioners, researchers, and academicians are presented with lessons learned by international experts to meet the new challenges of security in the global information age. Covering topics such as trust-based security, threat and risk analysis, and...
As the Internet grows and connects the world in new ways, computer security must become global and collaborative to understand and react to harmful se...
|
cena:
922,53 |
![]() |
Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions
ISBN: 9781605663265 / Angielski / Twarda / 2009 / 460 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating...
Foreword by Merrill Warkentin, Mississippi State University, USA. The increasing societal dependence on information technology has pushed cyber-securi...
|
cena:
995,01 |
![]() |
Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies
ISBN: 9781605663081 / Angielski / Twarda / 2009 / 396 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The World Wide Web and ubiquitous computing technologies have given a significant boost to the emerging field of XML database research. Open and Novel Issues in XML Database Applications: Future Directions and Advanced Technologies covers comprehensive issues and challenges discovered through leading international XML database research. A useful reference source for researchers, practitioners, and academicians, this book provides complete references to the latest research in XML technology.
The World Wide Web and ubiquitous computing technologies have given a significant boost to the emerging field of XML database research. Open and Novel...
|
cena:
995,01 |
![]() |
Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies
ISBN: 9781605662725 / Angielski / Twarda / 2009 / 340 str. Termin realizacji zamówienia: ok. 30 dni roboczych. As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social contexts for knowledge, learning, and human development. Social Web Evolution: Integrating Semantic Applications and Web 2.0 Technologies explores the potential of Web 2.0 and its synergies with the Semantic Web and provides state-of-the-art theoretical foundations and technological applications. A reference edition for academicians, practitioners, policy makers, and government officers eager for knowledge on Web 2.0 and social Web, this book...
As semantic technologies prove their value with targeted applications, there are increasing opportunities to consider their usefulness in social conte...
|
cena:
995,01 |
![]() |
Handbook of Research on Secure Multimedia Distribution
ISBN: 9781605662626 / Angielski / Twarda / 2009 / 616 str. Termin realizacji zamówienia: ok. 30 dni roboczych. New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students,...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, resea...
|
cena:
1355,90 |