• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Situational Awareness in Computer Network Defense: Principles, Methods and Applications Onwubiko, Cyril 9781466601048 Idea Group,U.S.
Situational Awareness in Computer Network Defense: Principles, Methods and Applications

ISBN: 9781466601048 / Angielski / Twarda / 2012 / 416 str.

ISBN: 9781466601048/Angielski/Twarda/2012/416 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Cyril Onwubiko;Thomas John Owens
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and...
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous...
cena: 999,40

 Optimizing Information Security and Advancing Privacy Assurance: New Technologies Nemati, Hamid 9781466600263 Idea Group,U.S.
Optimizing Information Security and Advancing Privacy Assurance: New Technologies

ISBN: 9781466600263 / Angielski / Twarda / 2012 / 340 str.

ISBN: 9781466600263/Angielski/Twarda/2012/340 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid Nemati
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
cena: 999,40

 Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances Chou, Te-Shun 9781613505076 Business Science Reference
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances

ISBN: 9781613505076 / Angielski / Twarda / 2011 / 372 str.

ISBN: 9781613505076/Angielski/Twarda/2011/372 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Te-Shun Chou
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
cena: 999,40

 Integrating Security and Software Engineering : Advances and Future Vision Mouratidis Haralambos Paolo Giorgini  9781599041483 IGI Publishing
Integrating Security and Software Engineering : Advances and Future Vision

ISBN: 9781599041483 / Angielski

ISBN: 9781599041483/Angielski

Termin realizacji zamówienia: ok. 30 dni roboczych.
Mouratidis Haralambos;Paolo Giorgini
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. ""Integrating Security and Software Engineering: Advances and Future Vision"" discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and softw...
cena: 412,44

 Digital Resources and Librarians : Case Studies in Innovation, Invention, and Implementation Patricia O'Brien Libutti Patricia O'Brien Libutti  9780838982624 ALA Editions
Digital Resources and Librarians : Case Studies in Innovation, Invention, and Implementation

ISBN: 9780838982624 / Angielski

ISBN: 9780838982624/Angielski

Termin realizacji zamówienia: ok. 30 dni roboczych.
Patricia O'Brien Libutti;Patricia O'Brien Libutti
Provides an overview and analysis of how the rise of digital resources for information services, collection development, and professional development has affected the professional work process of librarians.
Provides an overview and analysis of how the rise of digital resources for information services, collection development, and professional development ...
cena: 176,32

 CRIME On eBay Ford, Michael 9780984536108 Elite Minds Inc
CRIME On eBay

ISBN: 9780984536108 / Angielski / Miękka / 2012 / 128 str.

ISBN: 9780984536108/Angielski/Miękka/2012/128 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Ford
If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sent a payment and received nothing. Maybe you sent the auction item and the buyer reversed the payment. What do you do? Complaining on a message board may be a release emotionally but it does not recover your money or the item. It also does not protect you from other dishonest members. There are many books that cover the basics of buying and selling on eBay, but once you are on eBay, you need to know how to spot bad buyers or sellers before you...
If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sen...
cena: 49,91

 Cyberlibel: Information Warfare in the 21st Century? David A Potts   9781552212035 Irwin Law
Cyberlibel: Information Warfare in the 21st Century?

ISBN: 9781552212035 / Angielski / Miękka / 2011 / 517 str.

ISBN: 9781552212035/Angielski/Miękka/2011/517 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
David A Potts

Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus on how individuals and organizations can gain the upper hand in safeguarding - or restoring - their reputation once it's assaulted on the Internet.

The book examines caselaw from all common law jurisdictions including Canada, the US, the UK, and Australia and provides practical strategies that can be used in defamation actions related to the Internet.

Cyberlibel: Information Warfare in the 21st Century? includes the following topics in...

Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus...

cena: 239,99

 Computer Search Algorithms Benjamin D. Cohen 9781611225273 Nova Science Publishers Inc
Computer Search Algorithms

ISBN: 9781611225273 / Angielski / Twarda / 2012 / 205 str.

ISBN: 9781611225273/Angielski/Twarda/2012/205 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Benjamin D. Cohen
Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the resolution of a relevant optimisation problem from the telecommunications domain; the emergence and advances of quantum search algorithms; artificial neural networks; and, more.
Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the res...
cena: 639,23

 Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) Marcos Christodont 9780615330150 Proactive Assurance LLC
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)

ISBN: 9780615330150 / Angielski / Miękka / 2010 / 72 str.

ISBN: 9780615330150/Angielski/Miękka/2010/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Marcos Christodonte II
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
cena: 32,17

 The Lottery Industry: : Cases, Problems & Preventable Incidents Delehanty, Herb 9781419606878 Booksurge Publishing
The Lottery Industry: : Cases, Problems & Preventable Incidents

ISBN: 9781419606878 / Angielski / Miękka / 2005 / 156 str.

ISBN: 9781419606878/Angielski/Miękka/2005/156 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Herb Delehanty
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lottery Industry: Cases, Problems, and Preventable Incidents has something for you. From con artists to bogus drawings, from insider fraud to operational mishaps, and from dying satellites to rogue grandmothers-this book is packed with headaches faced by CEOs of lotteries around the world.
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lotter...
cena: 40,43

 Security for Wireless Sensor Networks Using Identity-Based Cryptography Patil, Harsh Kupwade 9781439869017 Auerbach Publications
Security for Wireless Sensor Networks Using Identity-Based Cryptography

ISBN: 9781439869017 / Angielski / Twarda / 2012 / 232 str.

ISBN: 9781439869017/Angielski/Twarda/2012/232 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Harsh Kupwade Patil; Stephen A. Szygenda

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security.

After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer...

Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele...

cena: 710,17

 Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It Zdziarski, Jonathan 9781449318741 O'Reilly Media
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

ISBN: 9781449318741 / Angielski / Miękka / 2012 / 358 str.

ISBN: 9781449318741/Angielski/Miękka/2012/358 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jonathan Zdziarski

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your...

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS app...

cena: 164,92

 Fundamentals of Communications and Networking Michael G. Solomon 9781449649173 Jones & Bartlett Publishers
Fundamentals of Communications and Networking

ISBN: 9781449649173 / Angielski / Miękka / 2011 / 488 str.

ISBN: 9781449649173/Angielski/Miękka/2011/488 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael G. Solomon
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasing Array Of Real-Time Communication Methods. Video Chat, Real-Time Messaging, And Always-Connected Resources Put Demands On Networks That Were Previously Unimagined. Fundamentals Of Communications And Networking Helps Readers Understand Today'S Networks And The Way They Support The Evolving Requirements Of Different Types Of Organizations. It Covers The Critical Issues Of Designing A Network That Will Meet An Organization'S Performance Needs And...
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasin...
cena: 545,52

 Step by Step Procedure: A little Handbook for System Administrator Kalingaraj, S. 9781461068303 Createspace
Step by Step Procedure: A little Handbook for System Administrator

ISBN: 9781461068303 / Angielski / Miękka / 2011 / 368 str.

ISBN: 9781461068303/Angielski/Miękka/2011/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
S. Kalingaraj
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students. Which might be really very helpful while they are sinking under pressure, this book includes with most common features which consists with four chapters. Chapter 01 includes Microsoft Windows default support tools and some third party tools used by a System administrator. Chapter 02 includes with most common windows boot errors and problems which we face today. Here I've explained you how to fix them and their causes to prevent it, with simple...
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students...
cena: 141,61

 Cloud-Computing-Security Tiberiu Tajts 9781461194064 Createspace
Cloud-Computing-Security

ISBN: 9781461194064 / Angielski / Miękka / 2011 / 354 str.

ISBN: 9781461194064/Angielski/Miękka/2011/354 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tiberiu Tajts
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * Proposed Cloud Computing Security Requirements Baseline * Reporting and Continuous Monitoring * Assessment and Authorization Process * Tools of Cloud Computing Risk Assessment * Conclusion * Abbreviations, Glossary and References
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * ...
cena: 161,81

 Spyware John M. Harkins 9781466221680 Createspace
Spyware

ISBN: 9781466221680 / Angielski / Miękka / 2011 / 92 str.

ISBN: 9781466221680/Angielski/Miękka/2011/92 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John M. Harkins
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general, spyware comes secretly bundled within freeware and shareware software that is downloaded from the Internet. Spyware programs work in the background without your knowledge and collect essential information related to you. This may include your usernames, passwords, bank account numbers, and any other personal and confidential information. This information is usually sent to external sources for malicious purposes. Unlike viruses, spyware...
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general...
cena: 80,80

 Disruptive Technologies, Innovation and Global Redesign: Emerging Implications Ekekwe, Ndubuisi 9781466601345 Information Science Reference
Disruptive Technologies, Innovation and Global Redesign: Emerging Implications

ISBN: 9781466601345 / Angielski / Twarda / 2012 / 604 str.

ISBN: 9781466601345/Angielski/Twarda/2012/604 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ndubuisi Ekekwe; Nazrul Islam
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical...
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace ...
cena: 922,53

 Managing Crises and Disasters with Emerging Technologies: Advancements Jennex, Murray 9781466601673 Information Science Reference
Managing Crises and Disasters with Emerging Technologies: Advancements

ISBN: 9781466601673 / Angielski / Twarda / 2012 / 316 str.

ISBN: 9781466601673/Angielski/Twarda/2012/316 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Murray Jennex
When a disaster strikes, having every possible resource available is an urgent need for those practitioners and government officials put in charge of aid and recovery to those in need. Managing Crises and Disasters with Emerging Technologies: Advancements offers the most vital, up-to-date research within the field of disaster management technologies. Since the first disaster information network was set up nearly fifteen years ago, information technologies have advanced at an exponential rate, allowing those managing emergencies, crises, and disasters to effectively manage and utilize data in...
When a disaster strikes, having every possible resource available is an urgent need for those practitioners and government officials put in charge of ...
cena: 896,90

 Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions Gupta, Manish 9781466601970 Information Science Reference
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions

ISBN: 9781466601970 / Angielski / Twarda / 2012 / 492 str.

ISBN: 9781466601970/Angielski/Twarda/2012/492 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Manish Gupta; John Walp; Raj Sharman
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
cena: 999,40

 Anonymous Security Systems and Applications: Requirements and Solutions Tamura, Shinsuke 9781466616493 Information Science Reference
Anonymous Security Systems and Applications: Requirements and Solutions

ISBN: 9781466616493 / Angielski / Twarda / 2012 / 266 str.

ISBN: 9781466616493/Angielski/Twarda/2012/266 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Shinsuke Tamura
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers' lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed...
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an...
cena: 999,40

Podprzednia  22  23  24  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia