
ilość książek w kategorii: 5020
![]() |
The Tangled Web
ISBN: 9781593273880 / Angielski / Miękka / 2011 / 320 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. "Thorough and comprehensive coverage from one of the foremost experts in browser security." Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world's top... "Thorough and comprehensive coverage from one of the foremost experts in browser security." ... |
cena:
286,79 |
![]() |
Backtrack 4: Assuring Security by Penetration Testing
ISBN: 9781849513944 / Angielski / Miękka / 2011 / 392 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step...
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered i...
|
cena:
237,33 |
![]() |
Hyperlink Analysis of Political Blogs Communication Patterns
ISBN: 9781617289224 / Angielski / Miękka / 2011 / 71 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communication patterns through the study of blogs links. It also presents and explains how a hyperlink analysis of blogs can be made.
Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communica...
|
cena:
273,19 |
![]() |
Healthy Passwords: Learn to make strong passwords you can remember
ISBN: 9780615456850 / Angielski / Miękka / 2011 / 152 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different passwords for different sites. - Learn a way to have unique passwords that regularly change for all your sites. It doesn't matter if you have a dozen or a hundred site passwords to remember. - Learn how to secure the devices you use. You will learn how to use your computers / devices in ways that make it difficult for others to capture your passwords. Learn how to harden your home network to keep...
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingr...
|
cena:
36,37 |
![]() |
Privacy and Big Data: The Players, Regulators, and Stakeholders
ISBN: 9781449305000 / Angielski / Miękka / 2011 / 108 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government... Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints th... |
cena:
82,44 |
![]() |
Disaster Recovery & Continuity of Business: A Project Management Guide and Workbook for Network Computing Environments
ISBN: 9781453609354 / Angielski / Miękka / 2010 / 160 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans that will make it possible for the company to keep working in the face of an event that cripples its information systems. Useful charts and helpful bulleted lists are offered for planning teams to customize for their company's needs. It's hard to think of any aspect of continuity planning that is not addressed by the book. Professional, thorough, detail-oriented and knowledgeable, the book is well organized and logically structured. It's clear to...
"The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans tha...
|
cena:
40,47 |
![]() |
The Psychology of Cyber Crime: Concepts and Principles
ISBN: 9781613503508 / Angielski / Twarda / 2011 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
|
cena:
999,40 |
![]() |
FIPS 140 Demystified: An Introductory Guide for Vendors
ISBN: 9781460990391 / Angielski / Miękka / 2011 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
|
cena:
80,88 |
![]() |
Wordpress 3 Ultimate Security
ISBN: 9781849512107 / Angielski / Miękka / 2011 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection...
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hun...
|
cena:
237,33 |
![]() |
Mobile Middleware Content & Service Delivery Platforms Assessment
ISBN: 9781617287619 / Angielski / Miękka / 2011 / 50 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book presents findings which show that platforms possess major strengths, while some drawbacks are still limiting the solutions effectiveness.
The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book ...
|
cena:
259,53 |
![]() |
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models
ISBN: 9781492160366 / Angielski / Miękka / 2013 / 152 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their...
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism a...
|
cena:
68,59 |
![]() |
Introduction to Computer Forensics: With 33 Real Life Cases
ISBN: 9781460970850 / Angielski / Miękka / 2011 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a quick read but covers the basics of computer forensics in a thorough and easily understood manner., The book does not disappoint the reader. It is punctuated throughout with fascinating real life anecdotes from real life court cases in which computer forensics proved instrumental in resolving a crime or an alleged civil wrongdoing. Beyond the basics, the book goes on to describe how computer...
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensic...
|
cena:
80,72 |
![]() |
Cyber Law
ISBN: 9781449977863 / Angielski / Miękka / 2009 / 118 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
44,10 |
![]() |
Cooperative Networking
ISBN: 9780470749159 / Angielski / Twarda / 2011 / 352 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book focuses on the latest trends and research results in Cooperative Networking
This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation... This book focuses on the latest trends and research results in Cooperative Networking
This book discusses the issues involved in cooperative... |
cena:
504,98 |
![]() |
Mathematical and Algorithmic Foundations of the Internet
ISBN: 9781439831380 / Angielski / Miękka / 2011 / 221 str. Termin realizacji zamówienia: ok. 22 dni roboczych. To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathematical and Algorithmic Foundations of the Internet introduces the concepts and methods upon which computer networks rely and explores their applications to the Internet and Web. The book offers a unique approach to mathematical and algorithmic concepts, demonstrating their universality by presenting ideas and examples from various fields, including literature, history, and art. Progressing from fundamental concepts to more... To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathemati... |
cena:
323,20 |
![]() |
Microsoft Windows Intune 2.0: QuickStart Administration
ISBN: 9781849682961 / Angielski / Miękka / 2012 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7 so your computers and users can operate at peak performance all the time. This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud se...
|
cena:
237,33 |
![]() |
Web Data Management
ISBN: 9781107012431 / Angielski / Twarda / 2011 / 435 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
|
cena:
252,22 |
![]() |
Digital Identity and Access Management: Technologies and Frameworks
ISBN: 9781613504987 / Angielski / Twarda / 2011 / 428 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
|
cena:
999,40 |
![]() |
Wireless Communications Circuits and Systems
ISBN: 9780852964439 / Angielski / Twarda / 2003 / 304 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in key RF, IF, analogue, mixed-signal components and single-chip transceivers in CMOS technology.
This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in...
|
cena:
537,32 |
![]() |
Going Mobile : Developing Apps for Your Library Using Basic HTML Programming
ISBN: 9780838911297 / Angielski / Miękka / 2011 / 64 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Patrons increasingly expect access to their libraries anywhere, anytime. This Special Report provides practical guidance in how librarians can put the library in the palms of their patrons' hands. Using the HTML skills that many librarians already have along with flexible development tools, technology expert La Counte shows how creating a customized mobile app doesn't need to be expensive or require deep expertise. In straightforward, practical terms he Demonstrates how to establish a presence on the mobile web with mobile websites and phone apps Details open-source development tools such as...
Patrons increasingly expect access to their libraries anywhere, anytime. This Special Report provides practical guidance in how librarians can put the...
|
cena:
191,02 |