
ilość książek w kategorii: 5012
![]() |
Handbook of Research on Innovations in Database Technologies and Applications: Current and Future Trends
ISBN: 9781605662428 / Angielski / Twarda / 2009 / 1087 str. Termin realizacji zamówienia: ok. 30 dni roboczych. There are a variety of new directions in which databases are growing, revealing new and exciting challenges and promising changes for the whole of society. The Handbook of Research on Innovations in Database Technologies and Applications: Current and Future Trends provides a wide compendium of references to topics in the field of database systems and applications. Offering an ideal resource of knowledge for students, researchers, and practitioners needing speedy and reliable information and authoritative references in database technologies, this reference book supplies not only broad coverage...
There are a variety of new directions in which databases are growing, revealing new and exciting challenges and promising changes for the whole of soc...
|
cena:
2526,20 |
![]() |
Social Computing in Homeland Security: Disaster Promulgation and Response
ISBN: 9781605662282 / Angielski / Twarda / 2009 / 283 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning...
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the m...
|
cena:
845,50 |
![]() |
Information Security Management, Education and Privacy: Ifip 18th World Computer Congress Tc11 19th International Information Security Workshops 22-27
ISBN: 9781402081446 / Angielski / Twarda / 2004 / 313 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The first one is the 10th IFIP Annual Working Conference on Information Security Management. It is organized by the IFIP WG 11. 1, which is itself dedicated to Information Security Management, i. e., not only to the practical implementation of new security technology issued from recent research and development, but also and mostly to the improvement of security practice in all organizations, from...
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that ar...
|
cena:
402,53 |
![]() |
Computer Security: Protecting Digital Resources: Protecting Digital Resources
ISBN: 9780763759940 / Angielski / Miękka / 2009 / 453 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Today, Society Is Faced With Numerous Internet Schemes, Fraudulent Scams, And Means Of Identity Theft That Threaten Our Safety And Our Peace Of Mind. Computer Security: Protecting Digital Resources Provides A Broad Approach To Computer-Related Crime, Electronic Commerce, Corporate Networking, And Internet Security, Topics That Have Become Increasingly Important As More And More Threats Are Made On Our Internet Environment. This Book Is Oriented Toward The Average Computer User, Business Professional, Government Worker, And Those Within The Education Community, With The Expectation That...
Today, Society Is Faced With Numerous Internet Schemes, Fraudulent Scams, And Means Of Identity Theft That Threaten Our Safety And Our Peace Of Mind. ...
|
cena:
886,48 |
![]() |
Advances in Network Information Theory
ISBN: 9780821834671 / Angielski / Twarda / 2004 Termin realizacji zamówienia: ok. 30 dni roboczych. Contains articles that focus on problems concerning efficient and reliable communication in multi-terminal settings. This book covers, 'Information Theory for Sources', which concentrates on network source coding problems; and 'Information Theory for Channels', where channels, rather than sources, are central to the problem.
Contains articles that focus on problems concerning efficient and reliable communication in multi-terminal settings. This book covers, 'Information Th...
|
cena:
563,24 |
![]() |
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
ISBN: 9780979958717 / Angielski / Miękka / 2009 / 468 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual...
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discov...
|
cena:
192,49 |
![]() |
Understanding Search Engines: Mathematical Modeling and Text Retrieval
ISBN: 9780898715811 / Angielski / Miękka / 2005 / 117 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The second edition of Understanding Search Engines: Mathematical Modeling and Text Retrieval follows the basic premise of the first edition by discussing many of the key design issues for building search engines and emphasizing the important role that applied mathematics can play in improving information retrieval. The authors discuss important data structures, algorithms, and software as well as user-centered issues such as interfaces, manual indexing, and document preparation. Significant changes bring the text up to date on current information retrieval methods: for example the addition of...
The second edition of Understanding Search Engines: Mathematical Modeling and Text Retrieval follows the basic premise of the first edition by discuss...
|
cena:
237,15 |
![]() |
Handbook of Security and Networks
ISBN: 9789814273039 / Angielski / Twarda / 2012 / 576 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recognized authorities in the field of security and networks contribute articles in their areas of expertise. These international researchers and practitioners are from highly-respected universities, renowned research institutions and IT companies from all over the world. Each self-contained chapter covers one essential research topic on security in computer networks. Through the efforts of all the authors, all chapters are written in a uniformed style;...
This valuable handbook is a comprehensive compilation of state-of-art advances on security in computer networks. More than 40 internationally recogniz...
|
cena:
891,39 |
![]() |
Policing Organized Crime: Intelligence Strategy Implementation
ISBN: 9781439810149 / Angielski / Twarda / 2009 / 286 str. Termin realizacji zamówienia: ok. 30 dni roboczych. When criminal activity is as straightforward as a child s game of cops and robbers, the role of the police is obvious, but today s bad guys don t always wear black. In fact, the most difficult criminals to cope with are those who straddle the gray divide between licit and illicit activity. Many of these nefarious sorts operate on the fringe of society, often acting the part of businesspersons, meeting the demands of otherwise law-abiding clientele with illegally procured or delivered goods. Others, specially trained to occupy positions of responsibility, make the most of position and... When criminal activity is as straightforward as a child s game of cops and robbers, the role of the police is obvious, but today s bad guys don t a... |
cena:
747,55 |
![]() |
Information Security Management : Concepts and Practice
ISBN: 9781420078541 / Angielski / Twarda / 2010 / 871 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Corporate information security is crucial for generating continuous business value in the modern world. This book presents a security audit methodology that conforms to the new security standard ISO 27001.
Corporate information security is crucial for generating continuous business value in the modern world. This book presents a security audit methodolog...
|
cena:
514,26 |
![]() |
Going Beyond Google: The Invisible Web in Learning and Teaching
ISBN: 9781555706333 / Angielski / Miękka / 2009 / 156 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book will show you in simple, non-technical terms how to integrate the invisible Web into teaching opportunities wherever they occur--in a onje-on-one "teaching moment" at the reference desk, or in a formal course. With this book you get expert teaching tips and scripts for informal instruction, plus model activities and assignments for the classroom. Statistics and summaries of relevant research will help you combat myths like "searching is easy," or "everything important is free."
This book will show you in simple, non-technical terms how to integrate the invisible Web into teaching opportunities wherever they occur--in a onje-o...
|
cena:
383,94 |
![]() |
Ad Hoc Networks: New Research
ISBN: 9781604568950 / Angielski / Twarda / 2009 / 152 str. Termin realizacji zamówienia: ok. 30 dni roboczych. An ad-hoc network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the network devices are part of the network only for the duration of a communications session. This book covers the latest research in the field.
An ad-hoc network is a local area network or other small network, especially one with wireless or temporary plug-in connections, in which some of the ...
|
cena:
568,09 |
![]() |
Cybersecurity, Cyberanalysis & Warning
ISBN: 9781606926581 / Angielski / Miękka / 2009 / 117 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Identifies key attributes of cyber analysis and warning capabilities, and compares these attributes with US-CERT's capabilities to identify whether there are gaps. This title also identifies US-CERT's challenges to developing and implementing key attributes and a successful national cyber analysis and warning capability.
Identifies key attributes of cyber analysis and warning capabilities, and compares these attributes with US-CERT's capabilities to identify whether th...
|
cena:
273,19 |
![]() |
Computer Attack & Cyberterrorism
ISBN: 9781606923375 / Angielski / Miękka / 2009 / 75 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that direct large numbers of compromised computers to launch attacks through the Internet as swarms. This book prov
Reports from security organisations show that random attacks are now increasingly implemented through use of automated tools, called 'bots', that dire...
|
cena:
259,53 |
![]() |
Police Leadership in a Democracy: Conversations with America's Police Chiefs
ISBN: 9781439808344 / Angielski / Miękka / 2009 / 158 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Every day the media floods the airwaves with their often-contradictory version of the role and behavior of the police force. Based on this, you might think that police officers either brutally enforce their own interpretation of the nation s laws or use all the modern tools available to carefully and persistently uncover the special clues that lead to the identification and arrest of suspected criminals. Based on interviews with 26 police chiefs, Police Leadership in a Democracy: Conversations with America s Police Chiefs takes a poignant journey through the minds of the... Every day the media floods the airwaves with their often-contradictory version of the role and behavior of the police force. Based on this, you mig... |
cena:
352,59 |
![]() |
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
ISBN: 9780071626750 / Angielski / Miękka / 2009 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding... "What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engine... |
cena:
262,04 |
![]() |
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
ISBN: 9780071626774 / Angielski / Miękka / 2009 / 544 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations." --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking... "Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with r... |
cena:
273,60 |
![]() |
FISMA Principles and Best Practices: Beyond Compliance
ISBN: 9781420078299 / Angielski / Twarda / 2011 / 345 str. Termin realizacji zamówienia: ok. 22 dni roboczych. In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased need to measure the ability of government organizations and companies subject to the standards to protect information. This book provides practical guidelines for addressing FISMA compliance.
In light of the legislation such as the Federal Information Security Management Act (FISMA), there is an increased need to measure the ability of gove...
|
cena:
612,21 |
![]() |
Evolving Application Domains of Data Warehousing and Mining: Trends and Solutions
ISBN: 9781605668161 / Angielski / Twarda / 2009 / 364 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Evolving Application Domains of Data Warehousing and Mining: Trends and Solutions provides insight into the latest findings concerning data warehousing, data mining, and their applications in everyday human activities.
Evolving Application Domains of Data Warehousing and Mining: Trends and Solutions provides insight into the latest findings concerning data warehousin...
|
cena:
922,53 |
![]() |
Your Library Goes Virtual
ISBN: 9781586832193 / Angielski / Miękka / 2006 / 200 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This step-by-step guide is essential for both those exploring the concept of virtual school libraries and for those who want to enhance and expand theirs. It summarizes the latest information about student and teacher use of electronic resources and addresses the concept of virtual school libraries in the context of program administration, information access and delivery, and learning and teaching. This must-have resource will serve as a guide to developing virtual school libraries that become enriching and useful presences within schools and their communities. This step-by-step guide is essential for both those exploring the concept of virtual school libraries and for those who want to enhance and expand ... |
cena:
170,08 |