
ilość książek w kategorii: 5019
![]() |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 2009 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Assessment and Therapy: Specialty Articles from the Encyclopedia of Mental Health
ISBN: 9780122678066 / Angielski / Miękka / 2001 / 341 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Assessment and Therapy is a derivative volume of articles pulled from the award-winning Encyclopedia of Mental Health, presenting a comprehensive overview of assessing and treating the many disorders afflicting mental health patients, including alcohol problems, Alzheimer's disease, depression, epilepsy, gambling, obsessive-compulsive disorder, phobias, and suicide. According to 1990 estimates, mental disorders represent five of the ten leading causes of disability. Among "developed" nations, including the United States, major depression is the leading cause of... Assessment and Therapy is a derivative volume of articles pulled from the award-winning Encyclopedia of Mental Health, presenting a c... |
cena:
411,41 |
![]() |
Network and System Security
ISBN: 9781597495356 / Angielski / Miękka / 2010 / 408 str. Termin realizacji zamówienia: ok. 10-14 dni roboczych. This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertize.
This work provides focused coverage of network and system security technologies. The book explores practical solutions to a wide range of network and ...
|
cena:
274,61 |
![]() |
Enterprise Cyber Security: principles and practice
ISBN: 9781492148791 / Angielski / Miękka / 2013 / 284 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
282,74 |
![]() |
Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives
ISBN: 9781615209019 / Angielski / Twarda / 2010 / 384 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquitous Modern Environment: Theoretical and Methodological Perspectives provides a variety of theoretical perspectives on the topics of trust and technology, as well as some empirical investigations into the trust-building, trust-maintenance, and trust-destroying practices in the context of technology. It presents research positioned at the intersection of the issues of trust within and between individuals, and organizations, and technology under...
In the past decade, trust has gained a prominent place at the center of academic scholarship in the social sciences. Trust and Technology in a Ubiquit...
|
cena:
922,53 |
![]() |
Surviving Cyberwar
ISBN: 9781605906881 / Angielski / Miękka / 2010 / 176 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
|
cena:
249,78 |
![]() |
Surviving Cyberwar
ISBN: 9781605906744 / Angielski / Twarda / 2010 / 176 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a...
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon ar...
|
cena:
411,41 |
![]() |
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption
ISBN: 9781615207374 / Angielski / Twarda / 2010 / 598 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study. "
"Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed s...
|
cena:
922,53 |
![]() |
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering
ISBN: 9781615207831 / Angielski / Twarda / 2010 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and...
In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet eff...
|
cena:
922,53 |
![]() |
Dynamic Police Training
ISBN: 9781439815878 / Angielski / Miękka / 2010 / 182 str. Termin realizacji zamówienia: ok. 22 dni roboczych. As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation for police work has traditionally been conducted on the job. Dynamic Police Training partners the experienced law enforcement officer s "street-smart" perspective of what makes training work with a professional educator s "book-smart" approach to writing curriculum to achieve the best results in police training programs. A results-oriented handbook for police trainers seeking clear and definitive information on... As police work has become increasingly professionalized, classrooms have become a preferred environment for training. However, the best preparation... |
cena:
391,77 |
![]() |
Junos Security: A Guide to Junos for the Srx Services Gateways and Security Certification
ISBN: 9781449381714 / Angielski / Miękka / 2010 / 848 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Junos(r) Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation,... Junos(r) Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a... |
cena:
309,28 |
![]() |
Certification and Security in Health-Related Web Applications: Concepts and Solutions
ISBN: 9781616928957 / Angielski / Twarda / 2010 / 354 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications--Provided by publisher.
This book aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and...
|
cena:
1252,79 |
![]() |
Dokumentenmanagementsysteme: Handbuch Zur Einführung
ISBN: 9783540412502 / Niemiecki / Twarda / 2001 / 254 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Dokumentenmanagementprojekte sind ganzheitliche Projekte. Organisatorische, technische und menschliche Faktoren entscheiden uber Erfolg oder Misserfolg. Das DMS-Handbuch hilft fruhzeitig Fehler zu erkennen und zu vermeiden. Es ist eine Pflichtlekture fur jeden, der sich mit dem Gedanken tragt, ein Dokumentenmanagementsystem einzufuhren. Schritt fur Schritt wird der Leser durch die einzelnen Projektstufen gefuhrt. Mit Hilfe von Tabellen, Charts und Diagrammen wird eine komplexe Materie ubersichtlich dargestellt. Ein ausfuhrliches Glossar mit Begriffserklarungen der Fachtermini und eine Fulle...
Dokumentenmanagementprojekte sind ganzheitliche Projekte. Organisatorische, technische und menschliche Faktoren entscheiden uber Erfolg oder Misserfol...
|
cena:
282,12 |
![]() |
Personal Data Privacy and Protection in a Surveillance Era: Technologies and Practices
ISBN: 9781609600839 / Angielski / Twarda / 2010 / 402 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats that cyberspace poses to the privacy of individuals, as well as the threats that surveillance technologies generate in public spaces and in digital communication--Provided by publisher.
This book spans a number of interdependent and emerging topics in the area of legal protection of privacy and technology and explores the new threats ...
|
cena:
922,53 |
![]() |
Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management
ISBN: 9781615208913 / Angielski / Twarda / 2010 / 358 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environments (e.g. MMORPGs) and Virtual Worlds in both scholarly and popular publications, very little is written about the issues and techniques one must consider when creating, deploying, interacting within, and managing them securely. Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning,...
Although one finds much discussion and research on the features and functionality of Rich Internet Applications (RIAs), the 3D Web, Immersive Environm...
|
cena:
922,53 |
![]() |
Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives
ISBN: 9781609601232 / Angielski / Twarda / 2011 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational and policy-making perspectives. Technological advances address challenges in information sharing, surveillance and analysis, but organizational advances are needed to foster collaboration between federal, state and local agencies as well as the private sector.
Recent developments in cyber security, crime, and forensics have attracted researcher and practitioner interests from technological, organizational an...
|
cena:
922,53 |
![]() |
Security and Privacy Assurance in Advancing Technologies: New Developments
ISBN: 9781609602000 / Angielski / Twarda / 2010 / 496 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changing roles of information technology and how this change will impact information security and privacy"--Provided by publisher.
"This book provides a comprehensive collection of knowledge from experts within the field of information security and privacy and explores the changin...
|
cena:
922,53 |
![]() |
IP Address Management
ISBN: 9780470585870 / Angielski / Twarda / 2011 / 448 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name System). The consequence of inaccurately configuring DHCP is that end users may not be able to obtain IP addresses to access the network. Without proper DNS configuration, usability of the network will greatly suffer as the name-to-address lookup process may fail. Imagine having to navigate to a website or send...
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management ...
|
cena:
597,78 |
![]() |
Patient Care Information Systems: Successful Design and Implementation
ISBN: 9780387942551 / Angielski / Twarda / 1994 / 218 str. Termin realizacji zamówienia: ok. 22 dni roboczych. In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating intense interest in patient care information systems. Health care institutions cannot provide seamlees access to care without seamless access to information, and they cannot manage and improve care without improved information management. Patient Care Information Systems examines how to design and implement these systems so they successfully meet the needs of physicians, nurses, and other health care providers. In one convenient...
In the current era of health care reform, the pressures to truly manage patient care and to build effective integrated delivery systems are generating...
|
cena:
201,24 |
![]() |
Least Privilege Security for Windows 7, Vista and XP
ISBN: 9781849680042 / Angielski / Miękka / 2010 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on the desktop, there are many technical challenges that you will face when restricting privileges. This book contains detailed step-by-step instructions for implementing Least Privilege Security on the desktop for different versions of Windows and related...
Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this ...
|
cena:
284,81 |