• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Tangled Web Michal Zalewski 9781593273880 No Starch Press
The Tangled Web

ISBN: 9781593273880 / Angielski / Miękka / 2011 / 320 str.

ISBN: 9781593273880/Angielski/Miękka/2011/320 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Michal Zalewski

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.

In The Tangled Web, Michal Zalewski, one of the world's top...

"Thorough and comprehensive coverage from one of the foremost experts in browser security."

--Tavis Ormandy, Google Inc.

...

cena: 286,79

 Backtrack 4: Assuring Security by Penetration Testing Ali, Shakeel 9781849513944 Packt Publishing
Backtrack 4: Assuring Security by Penetration Testing

ISBN: 9781849513944 / Angielski / Miękka / 2011 / 392 str.

ISBN: 9781849513944/Angielski/Miękka/2011/392 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Shakeel Ali; Heriyanto Tedi
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step...
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered i...
cena: 237,33

 Hyperlink Analysis of Political Blogs Communication Patterns Kostas Zafiropoulos, Vasiliki Vrana 9781617289224 Nova Science Publishers Inc
Hyperlink Analysis of Political Blogs Communication Patterns

ISBN: 9781617289224 / Angielski / Miękka / 2011 / 71 str.

ISBN: 9781617289224/Angielski/Miękka/2011/71 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Kostas Zafiropoulos;Vasiliki Vrana
Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communication patterns through the study of blogs links. It also presents and explains how a hyperlink analysis of blogs can be made.
Provides an introduction to WEB2.0 application, blogging and political blogging. This book presents several methodologies for studying blogs communica...
cena: 273,19

 Healthy Passwords: Learn to make strong passwords you can remember Klein, Ken S. 9780615456850 Sustainable Alternatives, LLC
Healthy Passwords: Learn to make strong passwords you can remember

ISBN: 9780615456850 / Angielski / Miękka / 2011 / 152 str.

ISBN: 9780615456850/Angielski/Miękka/2011/152 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ken S. Klein
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingredient list then use it to assemble different passwords for different sites. - Learn a way to have unique passwords that regularly change for all your sites. It doesn't matter if you have a dozen or a hundred site passwords to remember. - Learn how to secure the devices you use. You will learn how to use your computers / devices in ways that make it difficult for others to capture your passwords. Learn how to harden your home network to keep...
Learn To Make Strong Passwords You Can Remember - Learn how to make strong, memorable passwords using the password sandwich. - Learn to create an ingr...
cena: 36,37

 Privacy and Big Data: The Players, Regulators, and Stakeholders Craig, Terence 9781449305000 O'Reilly Media
Privacy and Big Data: The Players, Regulators, and Stakeholders

ISBN: 9781449305000 / Angielski / Miękka / 2011 / 108 str.

ISBN: 9781449305000/Angielski/Miękka/2011/108 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Terence Craig; Mary E. Ludloff

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.

Personal data is the hottest commodity on the market today--truly more valuable than gold. We are the asset that every company, industry, non-profit, and government...

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints th...

cena: 82,44

 Disaster Recovery & Continuity of Business: A Project Management Guide and Workbook for Network Computing Environments John L. Cimasi 9781453609354 Createspace
Disaster Recovery & Continuity of Business: A Project Management Guide and Workbook for Network Computing Environments

ISBN: 9781453609354 / Angielski / Miękka / 2010 / 160 str.

ISBN: 9781453609354/Angielski/Miękka/2010/160 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John L. Cimasi
"The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans that will make it possible for the company to keep working in the face of an event that cripples its information systems. Useful charts and helpful bulleted lists are offered for planning teams to customize for their company's needs. It's hard to think of any aspect of continuity planning that is not addressed by the book. Professional, thorough, detail-oriented and knowledgeable, the book is well organized and logically structured. It's clear to...
"The book offers a comprehensive guide for businesses on how to develop and implement effective disaster recovery and continuity of business plans tha...
cena: 40,47

 The Psychology of Cyber Crime: Concepts and Principles Kirwan, Gráinne 9781613503508 Information Science Reference
The Psychology of Cyber Crime: Concepts and Principles

ISBN: 9781613503508 / Angielski / Twarda / 2011 / 304 str.

ISBN: 9781613503508/Angielski/Twarda/2011/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Grinne Kirwan; Andrew Power
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers many aspects of cybercrime, including research on offenders, legal issues, the impact of cybercrime on victims, punishment, and preventative measures.
"The Psychology of Cyber Crime: Concepts and Principles" aims to be the leading reference examining the psychology of cybercrime. This book considers ...
cena: 999,40

 FIPS 140 Demystified: An Introductory Guide for Vendors Potter, Ray 9781460990391 Createspace
FIPS 140 Demystified: An Introductory Guide for Vendors

ISBN: 9781460990391 / Angielski / Miękka / 2011 / 226 str.

ISBN: 9781460990391/Angielski/Miękka/2011/226 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Wesley Hisao Higaki; Ray Potter; Yukie Higaki
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
cena: 80,88

 Wordpress 3 Ultimate Security Connelly, Olly 9781849512107 Packt Publishing
Wordpress 3 Ultimate Security

ISBN: 9781849512107 / Angielski / Miękka / 2011 / 408 str.

ISBN: 9781849512107/Angielski/Miękka/2011/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Olly Connelly
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hundreds of times. There's no silver bullet but if you want to cut the odds of a successful attack from practically inevitable to practically zero, read this book. WordPress 3 Ultimate Security shows you how to hack your site before someone else does. You'll uncover its weaknesses before sealing them off, securing your content and your day-to-day local-to-remote editorial process. This is more than some "10 Tips ..." guide. It's ultimate protection...
Most likely today some hacker tried to crack your WordPress site, its data and content maybe once but, with automated tools, very likely dozens or hun...
cena: 237,33

 Mobile Middleware Content & Service Delivery Platforms Assessment Antonio Ghezzi 9781617287619 Nova Science Publishers Inc
Mobile Middleware Content & Service Delivery Platforms Assessment

ISBN: 9781617287619 / Angielski / Miękka / 2011 / 50 str.

ISBN: 9781617287619/Angielski/Miękka/2011/50 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Antonio Ghezzi
The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book presents findings which show that platforms possess major strengths, while some drawbacks are still limiting the solutions effectiveness.
The growing complexity of mobile 'rich media' digital content and services requires the integration of next generation middleware platform. This book ...
cena: 259,53

 Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models Rehman, Rafeeq U. 9781492160366 Createspace
Information Security Leaders Handbook: How To Be An Effective Information Security Leader By Focusing On Fundamental Models

ISBN: 9781492160366 / Angielski / Miękka / 2013 / 152 str.

ISBN: 9781492160366/Angielski/Miękka/2013/152 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rafeeq U. Rehman
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism and hectavism, new political realities, and innovations by plain old criminals who want to steal data for financial benefits. Along with, the role and responsibilities of security professionals, especially the ones in the leadership roles, also change. Instead of playing a catch up game all the time, this book emphasizes focusing on basic principles and techniques. The information security leaders should implement these principles to update their...
The information security threat landscape changes frequently as a result of changes in technologies, economic issues, globalization, social activism a...
cena: 68,59

 Introduction to Computer Forensics: With 33 Real Life Cases MR Gordon E. Pelton 9781460970850 Createspace
Introduction to Computer Forensics: With 33 Real Life Cases

ISBN: 9781460970850 / Angielski / Miękka / 2011 / 180 str.

ISBN: 9781460970850/Angielski/Miękka/2011/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Gordon E. Pelton
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensics but who desires to learn about it. The book is a quick read but covers the basics of computer forensics in a thorough and easily understood manner., The book does not disappoint the reader. It is punctuated throughout with fascinating real life anecdotes from real life court cases in which computer forensics proved instrumental in resolving a crime or an alleged civil wrongdoing. Beyond the basics, the book goes on to describe how computer...
Introduction to Computer Forensics"" is an excellent book for the non-technical person who knows very little (or even nothing) about computer forensic...
cena: 80,72

 Cyber Law MR Anupa P. Kumar 9781449977863 Createspace
Cyber Law

ISBN: 9781449977863 / Angielski / Miękka / 2009 / 118 str.

ISBN: 9781449977863/Angielski/Miękka/2009/118 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Anupa P. Kumar
cena: 44,10

 Cooperative Networking  9780470749159
Cooperative Networking

ISBN: 9780470749159 / Angielski / Twarda / 2011 / 352 str.

ISBN: 9780470749159/Angielski/Twarda/2011/352 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
This book focuses on the latest trends and research results in Cooperative Networking

This book discusses the issues involved in cooperative networking, namely, bottleneck resource management, resource utilization, servers and content, security, and so on. In addition, the authors address instances of cooperation in nature which actively encourage the development of cooperation in telecommunication networks. Following an introduction to the fundamentals and issues surrounding cooperative networking, the book addresses models of cooperation, inspirations of successful cooperation...

This book focuses on the latest trends and research results in Cooperative Networking

This book discusses the issues involved in cooperative...

cena: 504,98

 Mathematical and Algorithmic Foundations of the Internet Luccio, Fabrizio|||Pagli, Linda|||Steel, Graham 9781439831380 Chapman & Hall/CRC Applied Algorithms and Dat
Mathematical and Algorithmic Foundations of the Internet

ISBN: 9781439831380 / Angielski / Miękka / 2011 / 221 str.

ISBN: 9781439831380/Angielski/Miękka/2011/221 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Fabrizio Luccio; Linda Pagli; Graham Steel

To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathematical and Algorithmic Foundations of the Internet introduces the concepts and methods upon which computer networks rely and explores their applications to the Internet and Web. The book offers a unique approach to mathematical and algorithmic concepts, demonstrating their universality by presenting ideas and examples from various fields, including literature, history, and art.

Progressing from fundamental concepts to more...

To truly understand how the Internet and Web are organized and function requires knowledge of mathematics and computation theory. Mathemati...

cena: 323,20

 Microsoft Windows Intune 2.0: QuickStart Administration Overton, David 9781849682961 COMPUTER BOOKSHOPS
Microsoft Windows Intune 2.0: QuickStart Administration

ISBN: 9781849682961 / Angielski / Miękka / 2012 / 312 str.

ISBN: 9781849682961/Angielski/Miękka/2012/312 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
D Overton
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7 so your computers and users can operate at peak performance all the time. This step-by-step guide will show you how to plan, set up and maintain Windows Intune, showing you how to manage a group of PCs (either 1 business or several if a partner) from the base operating system, through to the patches, anti-malware solution and deployed software and policies from a central console, using the Windows Intune service. This book...
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud se...
cena: 237,33

 Web Data Management Serge Abiteboul 9781107012431 CAMBRIDGE UNIVERSITY PRESS
Web Data Management

ISBN: 9781107012431 / Angielski / Twarda / 2011 / 435 str.

ISBN: 9781107012431/Angielski/Twarda/2011/435 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Serge Abiteboul
This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
This book explains the foundations of XML, the Web standard for data management, with a focus on data distribution.
cena: 252,22

 Digital Identity and Access Management: Technologies and Frameworks Sharman, Raj 9781613504987 Business Science Reference
Digital Identity and Access Management: Technologies and Frameworks

ISBN: 9781613504987 / Angielski / Twarda / 2011 / 428 str.

ISBN: 9781613504987/Angielski/Twarda/2011/428 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Raj Sharman;Sanjukta Das Smith;Manish Gupta
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals' access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of...
Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm ident...
cena: 999,40

 Wireless Communications Circuits and Systems Yichuang Sun   9780852964439 Institution of Engineering and Technology
Wireless Communications Circuits and Systems

ISBN: 9780852964439 / Angielski / Twarda / 2003 / 304 str.

ISBN: 9780852964439/Angielski/Twarda/2003/304 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yichuang Sun
This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in key RF, IF, analogue, mixed-signal components and single-chip transceivers in CMOS technology.
This new book examines integrated circuits, systems and transceivers for wireless and mobile communications. It covers the most recent developments in...
cena: 537,32

 Going Mobile : Developing Apps for Your Library Using Basic HTML Programming Scott La Counte   9780838911297 ALA Editions
Going Mobile : Developing Apps for Your Library Using Basic HTML Programming

ISBN: 9780838911297 / Angielski / Miękka / 2011 / 64 str.

ISBN: 9780838911297/Angielski/Miękka/2011/64 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Scott La Counte
Patrons increasingly expect access to their libraries anywhere, anytime. This Special Report provides practical guidance in how librarians can put the library in the palms of their patrons' hands. Using the HTML skills that many librarians already have along with flexible development tools, technology expert La Counte shows how creating a customized mobile app doesn't need to be expensive or require deep expertise. In straightforward, practical terms he Demonstrates how to establish a presence on the mobile web with mobile websites and phone apps Details open-source development tools such as...
Patrons increasingly expect access to their libraries anywhere, anytime. This Special Report provides practical guidance in how librarians can put the...
cena: 191,02

Podprzednia  22  23  24  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia