• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5012

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Hacking: The Next Generation Dhanjani, Nitesh 9780596154578 O'REILLY & ASSOC INC
Hacking: The Next Generation

ISBN: 9780596154578 / Angielski / Miękka / 2009 / 298 str.

ISBN: 9780596154578/Angielski/Miękka/2009/298 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nitesh Dhanjani

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social...

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a ...

cena: 154,10

 Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks Grant, Gail 9780070125544 McGraw-Hill Companies
Understanding Digital Signatures: Establishing Trust Over the Internet and Other Networks

ISBN: 9780070125544 / Angielski / Miękka / 1997 / 316 str.

ISBN: 9780070125544/Angielski/Miękka/1997/316 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gail Grant;Commercenet PKI Task Force
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to buy, sell, sign documents and exchange sensitive financial data on the Internet.
This volume explains the technology behind digital signatures and key infrastructures (PKI). These are the standards that make it absolutely safe to b...
cena: 161,85

 Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy Reddick, Christopher G. 9781605668345 Information Science Publishing
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy

ISBN: 9781605668345 / Angielski / Twarda / 2009 / 274 str.

ISBN: 9781605668345/Angielski/Twarda/2009/274 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher G. Reddick
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy delves into the challenges that public managers face in the adoption and implementation of information systems for homeland security.
Homeland Security Preparedness and Information Systems: Strategies for Managing Public Policy delves into the challenges that public managers face in ...
cena: 922,53

 Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition Yi Xian Yang 9781439818077 Chapman & Hall/CRC
Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition

ISBN: 9781439818077 / Angielski / Twarda / 2010 / 440 str.

ISBN: 9781439818077/Angielski/Twarda/2010/440 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Yi Xian Yang

Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Dimensional Hadamard Matrices, Second Edition explores the applications and dimensions of Hadamard matrices. This edition contains a new section on the applications of higher-dimensional Hadamard matrices to the areas of telecommunications and information security.

The first part of the book presents fast algorithms, updated constructions, existence results, and generalized forms for Walsh and Hadamard matrices. The second...

Drawing on the authors' use of the Hadamard-related theory in several successful engineering projects, Theory and Applications of Higher-Di...

cena: 881,59

 Knowledge Management: An Evolutionary View Irma Becerra-Fernandez 9780765616371 M.E. Sharpe
Knowledge Management: An Evolutionary View

ISBN: 9780765616371 / Angielski / Twarda / 2008 / 344 str.

ISBN: 9780765616371/Angielski/Twarda/2008/344 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Irma Becerra-Fernandez
This book serves as a complete introduction to the subject of Knowledge Management (KM), and incorporates technical as well as social aspects, concepts as well as practical examples, and traditional KM approaches as well as emerging topics. Knowledge Management: Systems and Processes enhances the conventional exposition of KM with an in-depth discussion of the technologies used to facilitate the management of knowledge in large and small organizations. This includes a complete description of the theory and applications of the various techniques and technologies currently in use to manage...
This book serves as a complete introduction to the subject of Knowledge Management (KM), and incorporates technical as well as social aspects, concept...
cena: 1077,50

 Harboring Data: Information Security, Law, and the Corporation Matwyshyn, Andrea M. 9780804760089 Stanford University Press
Harboring Data: Information Security, Law, and the Corporation

ISBN: 9780804760089 / Angielski / Twarda / 2009 / 368 str.

ISBN: 9780804760089/Angielski/Twarda/2009/368 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Andrea M. Matwyshyn
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics,...
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and th...
cena: 225,30

 HP Nonstop Server Security: A Practical Handbook Xypro Technology Corp 9781555583149 Digital Press
HP Nonstop Server Security: A Practical Handbook

ISBN: 9781555583149 / Angielski / Miękka / 2003 / 656 str.

ISBN: 9781555583149/Angielski/Miękka/2003/656 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Xypro Technology Corp; Terri Hill; Technology Corp Xypro
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop servers. Emphasis is placed on explaining security risks and best practices relevant to NonStop environments, and how to deploy native security tools (Guardian and Safeguard). All third party vendors who supply security solutions relevant to NonStop servers are listed, along with contact information for each vendor. The Handbook...
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken o...
cena: 484,88

 Intrusion Detection: A Machine Learning Approach Jeffrey J. P. Tsai 9781848164475 Imperial College Press
Intrusion Detection: A Machine Learning Approach

ISBN: 9781848164475 / Angielski / Twarda / 2011 / 184 str.

ISBN: 9781848164475/Angielski/Twarda/2011/184 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jeffrey J. P. Tsai
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents the architecture and implementation of IDS. It emphasizes on the prediction and learning algorithms for intrusion detection and highlights techniques for intrusion detection of wired computer networks and wireless sensor networks. The performance comparison of various IDS via simulation will also be included.
This important book introduces the concept of intrusion detection, discusses various approaches for intrusion detection systems (IDS), and presents th...
cena: 445,69

 Cybersecurity: Geopolitics, Law, and Policy Amos N. Guiora 9781138033290 CRC Press
Cybersecurity: Geopolitics, Law, and Policy

ISBN: 9781138033290 / Angielski / Miękka / 2017 / 176 str.

ISBN: 9781138033290/Angielski/Miękka/2017/176 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Amos N. Guiora

This book examines the legal and policy aspects of cyber-security.

It takes a much needed look at cyber-security from a geopolitical perspective. Through this lens, it seeks to broaden the reader's understanding of the legal and political considerations of individuals, corporations, law enforcement and regulatory bodies and management of the complex relationships between them. In drawing on interviews conducted with experts from a wide range of fields, the book presents the reader with dilemmas and paradigms that confront law makers, corporate leaders, law enforcement, and national...

This book examines the legal and policy aspects of cyber-security.

It takes a much needed look at cyber-security from a geopolitical perspec...

cena: 230,14

 Security in Ad Hoc and Sensor Networks Beyah, Raheem A. 9789814271080 WORLD SCIENTIFIC PUBLISHING CO PTE LTD
Security in Ad Hoc and Sensor Networks

ISBN: 9789814271080 / Angielski / Twarda / 2009 / 420 str.

ISBN: 9789814271080/Angielski/Twarda/2009/420 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Raheem Beyah; Janise McNair
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed.
Security issues in ad-hoc and sensor networks have become extremely important. This book provides a comprehensive treatment for security issues in the...
cena: 656,29

 Trust Modeling and Management in Digital Environments: From Social Concept to System Development Yan, Zheng 9781615206827 Information Science Publishing
Trust Modeling and Management in Digital Environments: From Social Concept to System Development

ISBN: 9781615206827 / Angielski / Twarda / 2010 / 598 str.

ISBN: 9781615206827/Angielski/Twarda/2010/598 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Zheng Yan
Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to a digital concept, enabling digital system users to build up confidence in their system.
Trust Modeling and Management in Digital Environments: From Social Concept to System Development examines how reliance is transferred from a social to...
cena: 922,53

 Handbook of Electronic Security and Digital Forensics Jahankhani, Hamid 9789812837035 WORLD SCIENTIFIC PUBLISHING CO PTE LTD
Handbook of Electronic Security and Digital Forensics

ISBN: 9789812837035 / Angielski / Twarda / 2010 / 708 str.

ISBN: 9789812837035/Angielski/Twarda/2010/708 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Hamid Jahankhani; David Lilburn Watson
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, extremism, or terrorism. This book provides literature on e-security needs across applications, implementation, testing or investigative techniques, judicial processes and criminal intelligence.
Cybercrime is one of the biggest growth industries around the globe, whether it is in the form of violation of company policies, fraud, hate crime, ex...
cena: 1023,62

 Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications San Murugesan 9781605663845 Information Science Publishing
Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Applications

ISBN: 9781605663845 / Angielski / Twarda / 2009 / 1120 str.

ISBN: 9781605663845/Angielski/Twarda/2009/1120 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
San Muregeson
The Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Application examines the social, cultural, and ethical issues of next generation web techonlogies, discussing real-world examples and case studies valuable to academicians, researchers, and practitioners.
The Handbook of Research on Web 2.0, 3.0, and X.0: Technologies, Business, and Social Application examines the social, cultural, and ethical issues of...
cena: 2526,20

 Digital Business Security Development: Management Technologies Kerr, Don 9781605668062 Business Science Reference
Digital Business Security Development: Management Technologies

ISBN: 9781605668062 / Angielski / Twarda / 2010 / 240 str.

ISBN: 9781605668062/Angielski/Twarda/2010/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Donn Kerr
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not specialists in the field as well as advanced undergraduate and postgraduate students undertaking research and further study.
Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protecti...
cena: 922,53

 Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization Olzak, Thomas 9781597494311 Syngress
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

ISBN: 9781597494311 / Angielski / Miękka / 2010 / 486 str.

ISBN: 9781597494311/Angielski/Miękka/2010/486 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Thomas Olzak
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk through step-by-step instructions on everything from building a Windows 2008 server to installing and configuring Hyper-V and App-V.

The book begins with the basics of virtualization, including the role of virtualization in the changing landscape of the traditional data center and its benefits,...

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those conside...
cena: 171,37

 Enterprise Security for the Executive: Setting the Tone from the Top Bayuk, Jennifer 9780313376603 Praeger Publishers
Enterprise Security for the Executive: Setting the Tone from the Top

ISBN: 9780313376603 / Angielski / Twarda / 2009 / 163 str.

ISBN: 9780313376603/Angielski/Twarda/2009/163 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jennifer Bayuk

"Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concepts and techniques to make sure they are able to manage and support the efforts of their security team. It is the first such work to define the leadership role for executives in any business's security apparatus.

In "Enterprise Security for the Executive," author Jennifer Bayuk, a highly regarded information security specialist and sought-after consultant and speaker, explains protocols and technologies at just the right level of depth for the...

"Enterprise Security for the Executive: Setting the Tone from the Top" is designed to help business executives become familiar with security concep...

cena: 299,02

 The Truth about the Internet and Online Predators Dingwell, Heath 9780816076482 Facts on File
The Truth about the Internet and Online Predators

ISBN: 9780816076482 / Angielski / Twarda / 2011 / 148 str.

ISBN: 9780816076482/Angielski/Twarda/2011/148 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
M. D. Tbd Robert N. Golden
To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with the Internet. The A-to-Z entries detail the social, legal, and personal risks of Internet use, while personal testimonies and question-and-answer sections provide readers with an inside look at common issues online.

Entries include:

Bullies and cyberbullying

Characteristics of online predators

Chat rooms and instant messaging

Internet safety

Parental control

Peers and peer pressure

Phishing and pharming

Privacy...

To help readers avoid and recognize risky behaviors, The Truth About the Internet and Online Predators explains many of the dangers associated with th...
cena: 141,98

 Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age Dunn Cavelty, Myriam 9780415569880 Routledge
Cyber-Security and Threat Politics: Us Efforts to Secure the Information Age

ISBN: 9780415569880 / Angielski / Miękka / 2009 / 182 str.

ISBN: 9780415569880/Angielski/Miękka/2009/182 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Myriam Dunn Cavelty

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.

Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat...

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in ...

cena: 225,25

 Dnssec Specifications Reed Media Services 9780979034275 Reed Media Services
Dnssec Specifications

ISBN: 9780979034275 / Angielski / Miękka / 2009 / 356 str.

ISBN: 9780979034275/Angielski/Miękka/2009/356 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Reed Media Services
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the important RFCs defining DNSSEC are collected in this volume. The indexed book covers DNS threats, DNS clarifications and protocol modifications, digital signatures, security algorithms, public and private keys, EDNS0, on-line signing, deployment steps, key rollovers, DNSSEC Lookaside Validation, and more.
DNSSEC Specifications provides a complete overview and exhaustive coverage of the requirements and features of the DNS Security Extensions. All of the...
cena: 98,02

 Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings McGovern, Glenn P. 9781439825129 CRC Press
Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings

ISBN: 9781439825129 / Angielski / Twarda / 2010 / 331 str.

ISBN: 9781439825129/Angielski/Twarda/2010/331 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Glenn McGovern

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Assassinations, Contract Killings, and Kidnappings is the most complete resource of information on the attack methodologies, tactics used, and groups responsible for targeted killings and kidnappings. The author, a former SWAT and JTTF team member whose experience includes providing protection to diplomats, high-ranking military personnel, prosecutors, and organized crime informants presents a wealth of global statistics on assassinations,...

Drawn from case examples of incidents from around the world, Targeted Violence: A Statistical and Tactical Analysis of Ass...

cena: 759,15

Podprzednia  19  20  21  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia