• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Network Security, Administration and Management: Advancing Technology and Practice Kar, Dulal Chandra 9781609607777 Information Science Publishing
Network Security, Administration and Management: Advancing Technology and Practice

ISBN: 9781609607777 / Angielski / Twarda / 2011 / 384 str.

ISBN: 9781609607777/Angielski/Twarda/2011/384 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Dulal Chandra Kar; Mahbubur Rahman Syed
Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.
Network Security, Administration and Management: Advancing Technologies and Practices identifies the latest technological solutions, practices and pri...
cena: 995,01

 Introduction to Cryptography with Open-Source Software Alasdair McAndrew 9781439825709 CRC Press
Introduction to Cryptography with Open-Source Software

ISBN: 9781439825709 / Angielski / Twarda / 2011 / 461 str.

ISBN: 9781439825709/Angielski/Twarda/2011/461 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Alasdair McAndrew

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.

Focusing on the cryptosystems themselves rather than the means of breaking them, the...

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Sou...

cena: 465,23

 Practical Deployment of Cisco Identity Services Engine (Ise): Real-World Examples of AAA Deployments Andy Richter Jeremy Wood 9780128044575 Syngress Publishing
Practical Deployment of Cisco Identity Services Engine (Ise): Real-World Examples of AAA Deployments

ISBN: 9780128044575 / Angielski / Miękka / 2015 / 298 str.

ISBN: 9780128044575/Angielski/Miękka/2015/298 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Andy Richter; Jeremy Wood

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a...

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins a...

cena: 269,33

 Routledge Handbook of Surveillance Studies David Lyon Kevin Haggerty Kirstie Ball 9780415588836 Routledge
Routledge Handbook of Surveillance Studies

ISBN: 9780415588836 / Angielski / Twarda / 2011 / 472 str.

ISBN: 9780415588836/Angielski/Twarda/2011/472 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
David Lyon; Kevin Haggerty; Kirstie Ball
Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.
Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innov...
cena: 1199,94

 Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies Zubairi, Junaid Ahmed 9781609608514 Information Science Publishing
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

ISBN: 9781609608514 / Angielski / Twarda / 2011 / 338 str.

ISBN: 9781609608514/Angielski/Twarda/2011/338 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Junaid Ahmed Zubairi; Athar Mahboob
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter...
Cyber security, encompassing both information and network security, is of utmost importance in today's information age. Cyber Security Standards, Prac...
cena: 995,01

 Privacy, Intrusion Detection and Response: Technologies for Protecting Networks Kabiri, Peyman 9781609608361 Information Science Publishing
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

ISBN: 9781609608361 / Angielski / Twarda / 2011 / 292 str.

ISBN: 9781609608361/Angielski/Twarda/2011/292 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Peyman Kabiri
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of...
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privac...
cena: 995,01

 Cyber Crime and the Victimization of Women: Laws, Rights and Regulations Halder, Debarati 9781609608309 Information Science Publishing
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations

ISBN: 9781609608309 / Angielski / Twarda / 2011 / 280 str.

ISBN: 9781609608309/Angielski/Twarda/2011/280 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Debarati Halder; K. Jaishankar
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better...
Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It e...
cena: 995,01

 Relief Supply Chain Management for Disasters: Humanitarian, Aid and Emergency Logistics Kovács, Gyöngyi 9781609608248 Business Science Reference
Relief Supply Chain Management for Disasters: Humanitarian, Aid and Emergency Logistics

ISBN: 9781609608248 / Angielski / Twarda / 2011 / 276 str.

ISBN: 9781609608248/Angielski/Twarda/2011/276 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Gyngi Kovcs
The purpose of this chapter is to provide a framework for the development of relief supply chain systems. An illustrative case study is presented in order to help relief supply chain decision makers in their relief supply chain planning process. Developing simulation models to test proposed relief supply chain response plans is much less risky than actually waiting for another disaster to happen and test the proposed relief supply chain model in a real life situation. The simulated outcome can then be used to refine the developed relief supply chain response model.
The purpose of this chapter is to provide a framework for the development of relief supply chain systems. An illustrative case study is presented in o...
cena: 995,01

 Get On Google Front Page Matthews, Jason 9781456523541 Createspace
Get On Google Front Page

ISBN: 9781456523541 / Angielski / Miękka / 2011 / 142 str.

ISBN: 9781456523541/Angielski/Miękka/2011/142 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Matthews
Want to get your website on Google's front page? Of course you do, if traffic and visitors matter. How do you rise to the very first page of results? Do you need money or an amazing website or thousands of daily visitors? Nope, you just need to know one thing: It's all about SEO (search engine optimization). Used wisely, SEO can get any site to the top without money or huge traffic. What exactly is SEO? It's the factors utilized by a website or blog that helps the search engines find them and see their relevance to the subject of search. Some are out of your control, like total number of...
Want to get your website on Google's front page? Of course you do, if traffic and visitors matter. How do you rise to the very first page of results? ...
cena: 40,43

 Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition) Johnston, Roger G. 9781460987384 Createspace
Security Sound Bites: Important Ideas About Security from Smart-Ass, Dumb-Ass, & Kick-Ass Quotations (2nd Edition)

ISBN: 9781460987384 / Angielski / Miękka / 2011 / 224 str.

ISBN: 9781460987384/Angielski/Miękka/2011/224 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Roger G. Johnston
This is the revised and expanded 2nd edition of a book that Security Magazine called "fascinating" and "full of thought triggers." Security Sound Bites offers quotes, observations, and anecdotes about security that'll make you think and make you laugh. We hear from the likes of Britney Spears and Albert Einstein, B movie dialog through ancient Greek dead guys, John Locke to Dan Quayle. Whether you're a cop, security officer, IT professional, security sales person, technician, government employee, or security manager, you'll find food for thought in this unique book. These quirky quotations...
This is the revised and expanded 2nd edition of a book that Security Magazine called "fascinating" and "full of thought triggers." Security Sound Bite...
cena: 68,59

 Synergy of Peer-to-Peer Networks & Mobile Ad-Hoc Networks: Bootstrapping & Routing Wei Ding 9781608769513 Nova Science Publishers Inc
Synergy of Peer-to-Peer Networks & Mobile Ad-Hoc Networks: Bootstrapping & Routing

ISBN: 9781608769513 / Angielski / Twarda / 2010 / 223 str.

ISBN: 9781608769513/Angielski/Twarda/2010/223 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Wei Ding
From the turn of the new millennium, the decentralization movement has gained more and more attention. This book discusses many issues that focus on bootstrapping and routing of the synergised P2P systems over MANETs.
From the turn of the new millennium, the decentralization movement has gained more and more attention. This book discusses many issues that focus on b...
cena: 734,61

 IBM Websphere Application Server V7.0 Security Siliceo, Omar 9781849681483 Packt Publishing
IBM Websphere Application Server V7.0 Security

ISBN: 9781849681483 / Angielski / Miękka / 2011 / 312 str.

ISBN: 9781849681483/Angielski/Miękka/2011/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Omar Siliceo
Secure your WebSphere applications with Java EE and JAAS security standardsDiscover the salient and new security features offered by WebSphere Application Server version 7.0 to create secure installationsExplore and learn how to secure Application Servers, Java Applications, and EJB Applications along with setting up user authentication and authorizationWith the help of extensive hands-on exercises and mini-projects, explore the various aspects needed to produce secure IBM WebSphere Application Server Network Deployment v7.0 infrastructuresA practical reference with ready-to-implement best...
Secure your WebSphere applications with Java EE and JAAS security standardsDiscover the salient and new security features offered by WebSphere Applica...
cena: 263,22

 3 Surefire Ways to Back Up Your WordPress Blog: Step-by-Step Ways to Protect Your Blog from Disappearing At Keepsmilingproducts Com, Ron Wilder 9781456420222 Createspace
3 Surefire Ways to Back Up Your WordPress Blog: Step-by-Step Ways to Protect Your Blog from Disappearing

ISBN: 9781456420222 / Angielski / Miękka / 2010 / 58 str.

ISBN: 9781456420222/Angielski/Miękka/2010/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ron Wilder At Keepsmilingproducts Com
So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's gone. What will YOU do? Well, if you've backed it up, then you'll just restore it. Problem solved Did you know, that it's not AUTOMATICALLY backed up? And that it's NOT easy to back it up? Didn't think so... This is where "3 Surefire Ways to Back Up Your WordPress Blog" comes in. Ron gives you three ways to back up your WordPress blog. The first one is for non-techies or those who don't want to learn how to do it and describes the important...
So, you've got this really cool WordPress blog You're feeling like all is really great. Then, one morning, you find out that it's been hacked It's g...
cena: 60,57

 Cloud Storage Forensics Choo, Raymond Quick, Darren Martini, Ben 9780124199705 Elsevier Science
Cloud Storage Forensics

ISBN: 9780124199705 / Angielski / Miękka / 2013 / 189 str.

ISBN: 9780124199705/Angielski/Miękka/2013/189 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing.

Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors...

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology ...

cena: 249,73

 A Bug Hunter's Diary Tobias Klein 9781593273859 No Starch Press,US
A Bug Hunter's Diary

ISBN: 9781593273859 / Angielski / Miękka / 2011 / 200 str.

ISBN: 9781593273859/Angielski/Miękka/2011/200 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tobias Klein
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs--or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical...

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on...
cena: 204,75

 Pfsense 2 Cookbook Williamson, Matt 9781849514866 Packt Publishing
Pfsense 2 Cookbook

ISBN: 9781849514866 / Angielski / Miękka / 2011 / 252 str.

ISBN: 9781849514866/Angielski/Miękka/2011/252 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Matt Williamson
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment's security needs. pfSense 2.0 Cookbook is the first and only book to explore all the features of pfSense, including those released in the latest 2.0 version. With...
pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versa...
cena: 211,44

 Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization Wrightson, Tyler 9780071828369 McGraw-Hill/Osborne Media
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

ISBN: 9780071828369 / Angielski / Miękka / 2014 / 464 str.

ISBN: 9780071828369/Angielski/Miękka/2014/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tyler Wrightson
Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples...

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills,...

cena: 235,06

 Application Security in the ISO 27001: 2013 Environment Vinod Vasudevan 9781849287678 Itgp
Application Security in the ISO 27001: 2013 Environment

ISBN: 9781849287678 / Angielski / Miękka / 2015 / 262 str.

ISBN: 9781849287678/Angielski/Miękka/2015/262 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Vinod Vasudevan
Web application security as part of an ISO27001-compliant information security management system As cyber security threats proliferate and attacks escalate, and as applications play an increasingly critical role in business, organisations urgently need to focus on web application security to protect their customers, their interests and their assets. SMEs in particular should be very concerned about web application security: many use common, off-the-shelf applications and plugins - such as Internet Explorer, Java, Silverlight, and Adobe Reader and Flash Player - which often contain exploitable...
Web application security as part of an ISO27001-compliant information security management system As cyber security threats proliferate and attacks esc...
cena: 202,27

 Continuous Authentication Using Biometrics: Data, Models, and Metrics Traore, Issa 9781613501290 Information Science Publishing
Continuous Authentication Using Biometrics: Data, Models, and Metrics

ISBN: 9781613501290 / Angielski / Twarda / 2011 / 296 str.

ISBN: 9781613501290/Angielski/Twarda/2011/296 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Issa Traore; Ahmed Awad E. Ahmed
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services in a secured environment. Traditionally, user authentication is performed statically at the point of entry of the system; however, continuous authentication (CA) seeks to address the shortcomings of this method by providing increased session security and combating insider threat. Continuous Authentication Using Biometrics: Data, Models, and Metrics presents chapters on continuous authentication using biometrics that have been contributed by the...
User authentication is the process of verifying whether the identity of a user is genuine prior to granting him or her access to resources or services...
cena: 999,40

 Visual Cryptography and Secret Image Sharing Stelvio Cimato Ching-Nung Yang 9781439837214 CRC Press
Visual Cryptography and Secret Image Sharing

ISBN: 9781439837214 / Angielski / Twarda / 2011 / 546 str.

ISBN: 9781439837214/Angielski/Twarda/2011/546 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Stelvio Cimato; Ching-Nung Yang

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information.

Image data protection and image-based authentication techniques offer efficient solutions for...

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Cons...

cena: 1004,03

Podprzednia  22  23  24  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia