
ilość książek w kategorii: 5012
![]() |
Hacking: The Next Generation
ISBN: 9780596154578 / Angielski / Miękka / 2009 / 298 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a ... |
cena:
154,10 |
![]() |
Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks
ISBN: 9780070125544 / Angielski / Miękka / 1997 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to b...
|
cena:
161,85 |
![]() |
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy
ISBN: 9781605668345 / Angielski / Twarda / 2009 / 274 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy delves into the challenges that public managers face in the adoption and implementation of information systems for homeland security.
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy delves into the challenges that public managers face in ...
|
cena:
922,53 |
![]() |
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition
ISBN: 9781439818077 / Angielski / Twarda / 2010 / 440 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition explores the applications and dimensions of Hadamard matrices. This edition contains a new section on the applications of higher-dimensional Hadamard matrices to the areas of telecommunications and information security. The first part of the book presents fast algorithms, updated constructions, existence results, and generalized forms for Walsh and Hadamard matrices. The second... Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Di... |
cena:
881,59 |
![]() |
Knowledge Management: An Evolutionary View
ISBN: 9780765616371 / Angielski / Twarda / 2008 / 344 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book serves as a complete introduction to the subject of Knowledge Management (KM), and incorporates technical as well as social aspects, concepts as well as practical examples, and traditional KM approaches as well as emerging topics. Knowledge Management: Systems and Processes enhances the conventional exposition of KM with an in-depth discussion of the technologies used to facilitate the management of knowledge in large and small organizations. This includes a complete description of the theory and applications of the various techniques and technologies currently in use to manage...
This book serves as a complete introduction to the subject of Knowledge Management (KM), and incorporates technical as well as social aspects, concept...
|
cena:
1077,50 |
![]() |
Harboring Data: Information Security, Law, and the Corporation
ISBN: 9780804760089 / Angielski / Twarda / 2009 / 368 str. Termin realizacji zamówienia: ok. 30 dni roboczych. As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics,...
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and th...
|
cena:
225,30 |
![]() |
HP Nonstop Server Security: A Practical Handbook
ISBN: 9781555583149 / Angielski / Miękka / 2003 / 656 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook...
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken o...
|
cena:
484,88 |
![]() |
Intrusion Detection: A Machine Learning Approach
ISBN: 9781848164475 / Angielski / Twarda / 2011 / 184 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents th...
|
cena:
445,69 |
![]() |
Cybersecurity: Geopolitics, Law, and Policy
ISBN: 9781138033290 / Angielski / Miękka / 2017 / 176 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national... This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a geopolitical perspec... |
cena:
230,14 |
![]() |
Security in Ad Hoc and Sensor Networks
ISBN: 9789814271080 / Angielski / Twarda / 2009 / 420 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed.
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in the...
|
cena:
656,29 |
![]() |
Trust Modeling and Management in Digital Environments: From Social Concept to System Development
ISBN: 9781615206827 / Angielski / Twarda / 2010 / 598 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to a digital concept, enabling digital system users to build up confidence in their system.
Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to...
|
cena:
922,53 |
![]() |
Handbook of Electronic Security and Digital Forensics
ISBN: 9789812837035 / Angielski / Twarda / 2010 / 708 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. This book provides literature on e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence.
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, ex...
|
cena:
1023,62 |
![]() |
Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications
ISBN: 9781605663845 / Angielski / Twarda / 2009 / 1120 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Application examines the social, cultural, and ethical issues of next generation web techonlogies, discussing real-world examples and case studies valuable to academicians, researchers, and practitioners.
The Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Application examines the social, cultural, and ethical issues of...
|
cena:
2526,20 |
![]() |
Digital Business Security Development: Management Technologies
ISBN: 9781605668062 / Angielski / Twarda / 2010 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protecti...
|
cena:
922,53 |
![]() |
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
ISBN: 9781597494311 / Angielski / Miękka / 2010 / 486 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V. The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits,...
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those conside...
|
cena:
171,37 |
![]() |
Enterprise Security for the Executive: Setting the Tone from the Top
ISBN: 9780313376603 / Angielski / Twarda / 2009 / 163 str. Termin realizacji zamówienia: ok. 30 dni roboczych. "Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concepts and techniques to make sure they are able to manage and support the efforts of their security team. It is the first such work to define the leadership role for executives in any business's security apparatus. In "Enterprise Security for the Executive," author Jennifer Bayuk, a highly regarded information security specialist and sought-after consultant and speaker, explains protocols and technologies at just the right level of depth for the... "Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concep... |
cena:
299,02 |
![]() |
The Truth about the Internet and Online Predators
ISBN: 9780816076482 / Angielski / Twarda / 2011 / 148 str. Termin realizacji zamówienia: ok. 30 dni roboczych. To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with the Internet. The A-to-Z entries detail the social, legal, and personal risks of Internet use, while personal testimonies and question-and-answer sections provide readers with an inside look at common issues online.
Entries include: Bullies and cyberbullying Characteristics of online predators Chat rooms and instant messaging Internet safety Parental control Peers and peer pressure Phishing and pharming Privacy... To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with th...
|
cena:
141,98 |
![]() |
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age
ISBN: 9780415569880 / Angielski / Miękka / 2009 / 182 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat... This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ... |
cena:
225,25 |
![]() |
Dnssec Specifications
ISBN: 9780979034275 / Angielski / Miękka / 2009 / 356 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
|
cena:
98,02 |
![]() |
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings
ISBN: 9781439825129 / Angielski / Twarda / 2010 / 331 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations,... Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Ass... |
cena:
759,15 |