• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5019

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Cybercrime, Cyberterrorism, and Cyberwarfare Robert T. Mba MS Uda 9781441572172 Xlibris Corporation
Cybercrime, Cyberterrorism, and Cyberwarfare

ISBN: 9781441572172 / Angielski / Miękka / 2009 / 276 str.

ISBN: 9781441572172/Angielski/Miękka/2009/276 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Robert T. Mba MS Uda
cena: 80,88

 Assessment and Therapy: Specialty Articles from the Encyclopedia of Mental Health Friedman, Howard S. 9780122678066 Academic Press
Assessment and Therapy: Specialty Articles from the Encyclopedia of Mental Health

ISBN: 9780122678066 / Angielski / Miękka / 2001 / 341 str.

ISBN: 9780122678066/Angielski/Miękka/2001/341 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Howard S. Friedman

Assessment and Therapy is a derivative volume of articles pulled from the award-winning Encyclopedia of Mental Health, presenting a comprehensive overview of assessing and treating the many disorders afflicting mental health patients, including alcohol problems, Alzheimer's disease, depression, epilepsy, gambling, obsessive-compulsive disorder, phobias, and suicide.

According to 1990 estimates, mental disorders represent five of the ten leading causes of disability. Among "developed" nations, including the United States, major depression is the leading cause of...

Assessment and Therapy is a derivative volume of articles pulled from the award-winning Encyclopedia of Mental Health, presenting a c...

cena: 411,41

 Network and System Security John R. Vacca 9781597495356 Syngress Media,U.S.
Network and System Security

ISBN: 9781597495356 / Angielski / Miękka / 2010 / 408 str.

ISBN: 9781597495356/Angielski/Miękka/2010/408 str.

Termin realizacji zamówienia: ok. 10-14 dni roboczych.
John R. Vacca
This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertize.
This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and ...
cena: 274,61

 Enterprise Cyber Security: principles and practice Dhillon, Gurpreet S. 9781492148791 Createspace
Enterprise Cyber Security: principles and practice

ISBN: 9781492148791 / Angielski / Miękka / 2013 / 284 str.

ISBN: 9781492148791/Angielski/Miękka/2013/284 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gurpreet S. Dhillon
cena: 282,74

 Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives Latusek, Dominika 9781615209019 Information Science Publishing
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives

ISBN: 9781615209019 / Angielski / Twarda / 2010 / 384 str.

ISBN: 9781615209019/Angielski/Twarda/2010/384 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dominika Latusek; Alexandra Gerbasi
In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under...
In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquit...
cena: 922,53

 Surviving Cyberwar Richard Stiennon 9781605906881 Government Institutes
Surviving Cyberwar

ISBN: 9781605906881 / Angielski / Miękka / 2010 / 176 str.

ISBN: 9781605906881/Angielski/Miękka/2010/176 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Richard Stiennon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
cena: 249,78

 Surviving Cyberwar Stiennon, Richard 9781605906744 Government Institutes
Surviving Cyberwar

ISBN: 9781605906744 / Angielski / Twarda / 2010 / 176 str.

ISBN: 9781605906744/Angielski/Twarda/2010/176 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Richard Stiennon
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
cena: 411,41

 Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption Banerjee, Santo 9781615207374 Information Science Publishing
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption

ISBN: 9781615207374 / Angielski / Twarda / 2010 / 598 str.

ISBN: 9781615207374/Angielski/Twarda/2010/598 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Santo Banerjee
"Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study. "
"Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed s...
cena: 922,53

 Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering Nemati, Hamid R. 9781615207831 Information Science Publishing
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

ISBN: 9781615207831 / Angielski / Twarda / 2010 / 408 str.

ISBN: 9781615207831/Angielski/Twarda/2010/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid R. Nemati; Li Yang
In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and...
In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet eff...
cena: 922,53

 Dynamic Police Training Ann R Bumbak   9781439815878 Taylor and Francis
Dynamic Police Training

ISBN: 9781439815878 / Angielski / Miękka / 2010 / 182 str.

ISBN: 9781439815878/Angielski/Miękka/2010/182 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Ann R Bumbak

As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation for police work has traditionally been conducted on the job. Dynamic Police Training partners the experienced law enforcement officer s "street-smart" perspective of what makes training work with a professional educator s "book-smart" approach to writing curriculum to achieve the best results in police training programs.

A results-oriented handbook for police trainers seeking clear and definitive information on...

As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation...

cena: 391,77

 Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification Cameron, Rob 9781449381714 O'Reilly Media
Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification

ISBN: 9781449381714 / Angielski / Miękka / 2010 / 848 str.

ISBN: 9781449381714/Angielski/Miękka/2010/848 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Sj James Quinn; Timothy Eberhard; Brad Woodberg

Junos(r) Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.

Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation,...

Junos(r) Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a...

cena: 309,28

 Certification and Security in Health-Related Web Applications: Concepts and Solutions Chryssanthou, Anargyros 9781616928957 Medical Information Science Reference
Certification and Security in Health-Related Web Applications: Concepts and Solutions

ISBN: 9781616928957 / Angielski / Twarda / 2010 / 354 str.

ISBN: 9781616928957/Angielski/Twarda/2010/354 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Anargyros Chryssanthou; Ioannis Apostolakis; Iraklis Varlamis
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications--Provided by publisher.
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and...
cena: 1252,79

 Dokumentenmanagementsysteme: Handbuch Zur Einführung Klingelhöller, Harald 9783540412502 Springer
Dokumentenmanagementsysteme: Handbuch Zur Einführung

ISBN: 9783540412502 / Niemiecki / Twarda / 2001 / 254 str.

ISBN: 9783540412502/Niemiecki/Twarda/2001/254 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Harald Klingelhvller
Dokumentenmanagementprojekte sind ganzheitliche Projekte. Organisatorische, technische und menschliche Faktoren entscheiden uber Erfolg oder Misserfolg. Das DMS-Handbuch hilft fruhzeitig Fehler zu erkennen und zu vermeiden. Es ist eine Pflichtlekture fur jeden, der sich mit dem Gedanken tragt, ein Dokumentenmanagementsystem einzufuhren. Schritt fur Schritt wird der Leser durch die einzelnen Projektstufen gefuhrt. Mit Hilfe von Tabellen, Charts und Diagrammen wird eine komplexe Materie ubersichtlich dargestellt. Ein ausfuhrliches Glossar mit Begriffserklarungen der Fachtermini und eine Fulle...
Dokumentenmanagementprojekte sind ganzheitliche Projekte. Organisatorische, technische und menschliche Faktoren entscheiden uber Erfolg oder Misserfol...
cena: 282,12

 Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices Akrivopoulou, Christina 9781609600839 Information Science Publishing
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices

ISBN: 9781609600839 / Angielski / Twarda / 2010 / 402 str.

ISBN: 9781609600839/Angielski/Twarda/2010/402 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christina Akrivopoulou
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication--Provided by publisher.
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats ...
cena: 922,53

 Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management Rea, Alan 9781615208913 Information Science Publishing
Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management

ISBN: 9781615208913 / Angielski / Twarda / 2010 / 358 str.

ISBN: 9781615208913/Angielski/Twarda/2010/358 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Alan Rea
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, interacting within, and managing them securely. Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning,...
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environm...
cena: 922,53

 Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives Santanam, Raghu 9781609601232 Information Science Publishing
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

ISBN: 9781609601232 / Angielski / Twarda / 2011 / 316 str.

ISBN: 9781609601232/Angielski/Twarda/2011/316 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Raghu Santanam; M. Sethumadhavan; Mohit Virendra
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational an...
cena: 922,53

 Security and Privacy Assurance in Advancing Technologies: New Developments Nemati, Hamid 9781609602000 Information Science Publishing
Security and Privacy Assurance in Advancing Technologies: New Developments

ISBN: 9781609602000 / Angielski / Twarda / 2010 / 496 str.

ISBN: 9781609602000/Angielski/Twarda/2010/496 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid R. Nemati
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
cena: 922,53

 IP Address Management Rooney, Timothy 9780470585870
IP Address Management

ISBN: 9780470585870 / Angielski / Twarda / 2011 / 448 str.

ISBN: 9780470585870/Angielski/Twarda/2011/448 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Timothy Rooney
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management ...
cena: 597,78

 Patient Care Information Systems: Successful Design and Implementation Drazen, Erica L. 9780387942551 Springer
Patient Care Information Systems: Successful Design and Implementation

ISBN: 9780387942551 / Angielski / Twarda / 1994 / 218 str.

ISBN: 9780387942551/Angielski/Twarda/1994/218 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Erica Drazen; J. B. Metzger; E. L. Drazen
In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating intense interest in patient care information systems. Health care institutions cannot provide seamlees access to care without seamless access to information, and they cannot manage and improve care without improved information management. Patient Care Information Systems examines how to design and implement these systems so they successfully meet the needs of physicians, nurses, and other health care providers. In one convenient...
In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating...
cena: 201,24

 Least Privilege Security for Windows 7, Vista and XP Russell Smith 9781849680042 Packt Publishing
Least Privilege Security for Windows 7, Vista and XP

ISBN: 9781849680042 / Angielski / Miękka / 2010 / 464 str.

ISBN: 9781849680042/Angielski/Miękka/2010/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Russell Smith
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
cena: 284,81

Podprzednia  19  20  21  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia