
ilość książek w kategorii: 5020
![]() |
Situational Awareness in Computer Network Defense: Principles, Methods and Applications
ISBN: 9781466601048 / Angielski / Twarda / 2012 / 416 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous security devices and software such as firewalls, Intrusion Detection Systems (IDS), and Security Information and Event Management (SIEM) to monitor networks in conjunction with Computer Security Incident Response Teams (CSIRT) that are responsible for ensuring availability, integrity, and confidentiality of network services. Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and...
Worldwide computer crimes cost organizations and governments billions of dollars each year. In response, organizations use a plethora of heterogeneous...
|
cena:
999,40 |
![]() |
Optimizing Information Security and Advancing Privacy Assurance: New Technologies
ISBN: 9781466600263 / Angielski / Twarda / 2012 / 340 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amounts of information online. Optimizing Information Security and Advancing Privacy Assurance: New Technologies reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises. Enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems are discussed in this multidisciplinary collection of research, with the primary...
Security and privacy are key considerations for individuals and organizations conducting increasing amounts of business and sharing considerable amoun...
|
cena:
999,40 |
![]() |
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
ISBN: 9781613505076 / Angielski / Twarda / 2011 / 372 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this increased use, computer systems have inevitably become targets for attack. Once these attacks successfully explore the vulnerabilities of an information system, the confidential information in the system can be accessed and used by those attackers who are not authorized to access to the information. Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances details current trends and advances in information...
The rapid growth of Internet-based technology has led to the widespread use of computer networks such as Web search and email service. With this incre...
|
cena:
999,40 |
![]() |
Integrating Security and Software Engineering : Advances and Future Vision
ISBN: 9781599041483 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and software engineering. This book introduces the field of secure software engineering, which is a branch of research investigating the integration of security concerns into software engineering practices. ""Integrating Security and Software Engineering: Advances and Future Vision"" discusses problems and challenges of considering security during the development of software systems, and also presents the predominant theoretical and practical approaches...
Integrating Security and Software Engineering: Advances and Future Vision provides the first step towards narrowing the gap between security and softw...
|
cena:
412,44 |
![]() |
Digital Resources and Librarians : Case Studies in Innovation, Invention, and Implementation
ISBN: 9780838982624 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. Provides an overview and analysis of how the rise of digital resources for information services, collection development, and professional development has affected the professional work process of librarians.
Provides an overview and analysis of how the rise of digital resources for information services, collection development, and professional development ...
|
cena:
176,32 |
![]() |
CRIME On eBay
ISBN: 9780984536108 / Angielski / Miękka / 2012 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sent a payment and received nothing. Maybe you sent the auction item and the buyer reversed the payment. What do you do? Complaining on a message board may be a release emotionally but it does not recover your money or the item. It also does not protect you from other dishonest members. There are many books that cover the basics of buying and selling on eBay, but once you are on eBay, you need to know how to spot bad buyers or sellers before you...
If you have been using eBay for a while, chances are you've been scammed at least once. Maybe you encountered a problem seller or buyer. Maybe you sen...
|
cena:
49,91 |
![]() |
Cyberlibel: Information Warfare in the 21st Century?
ISBN: 9781552212035 / Angielski / Miękka / 2011 / 517 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus on how individuals and organizations can gain the upper hand in safeguarding - or restoring - their reputation once it's assaulted on the Internet. The book examines caselaw from all common law jurisdictions including Canada, the US, the UK, and Australia and provides practical strategies that can be used in defamation actions related to the Internet. Cyberlibel: Information Warfare in the 21st Century? includes the following topics in... Cyberlibel: Information Warfare in the 21st Century? by David A. Potts brings years of research and experience in libel and slander law into focus... |
cena:
239,99 |
![]() |
Computer Search Algorithms
ISBN: 9781611225273 / Angielski / Twarda / 2012 / 205 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the resolution of a relevant optimisation problem from the telecommunications domain; the emergence and advances of quantum search algorithms; artificial neural networks; and, more.
Presents research data in the study of computer search algorithms, including live soft-matter quantum computing; heuristic searches applied to the res...
|
cena:
639,23 |
![]() |
Cyber Within: A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention)
ISBN: 9780615330150 / Angielski / Miękka / 2010 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with...
From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --...
|
cena:
32,17 |
![]() |
The Lottery Industry: : Cases, Problems & Preventable Incidents
ISBN: 9781419606878 / Angielski / Miękka / 2005 / 156 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lottery Industry: Cases, Problems, and Preventable Incidents has something for you. From con artists to bogus drawings, from insider fraud to operational mishaps, and from dying satellites to rogue grandmothers-this book is packed with headaches faced by CEOs of lotteries around the world.
Whether you are learning about the lottery industry for first time, giving yourself a refresher, or assessing the breadth of your knowledge-The Lotter...
|
cena:
40,43 |
![]() |
Security for Wireless Sensor Networks Using Identity-Based Cryptography
ISBN: 9781439869017 / Angielski / Twarda / 2012 / 232 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security-detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer...Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wirele... |
cena:
710,17 |
![]() |
Hacking and Securing IOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
ISBN: 9781449318741 / Angielski / Miękka / 2012 / 358 str. Termin realizacji zamówienia: ok. 30 dni roboczych. If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your... If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS app... |
cena:
164,92 |
![]() |
Fundamentals of Communications and Networking
ISBN: 9781449649173 / Angielski / Miękka / 2011 / 488 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasing Array Of Real-Time Communication Methods. Video Chat, Real-Time Messaging, And Always-Connected Resources Put Demands On Networks That Were Previously Unimagined. Fundamentals Of Communications And Networking Helps Readers Understand Today'S Networks And The Way They Support The Evolving Requirements Of Different Types Of Organizations. It Covers The Critical Issues Of Designing A Network That Will Meet An Organization'S Performance Needs And...
Networks Have Long Been Regarded As Methods To Connect Resources. While This Is Still That Case, Today'S Networks Are Required To Support An Increasin...
|
cena:
545,52 |
![]() |
Step by Step Procedure: A little Handbook for System Administrator
ISBN: 9781461068303 / Angielski / Miękka / 2011 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students. Which might be really very helpful while they are sinking under pressure, this book includes with most common features which consists with four chapters. Chapter 01 includes Microsoft Windows default support tools and some third party tools used by a System administrator. Chapter 02 includes with most common windows boot errors and problems which we face today. Here I've explained you how to fix them and their causes to prevent it, with simple...
How & To Whom it helps for? This book is dedicated for the pupil's those who are seeking to learn knowledge in both IT/Non-IT departments and students...
|
cena:
141,61 |
![]() |
Cloud-Computing-Security
ISBN: 9781461194064 / Angielski / Miękka / 2011 / 354 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * Proposed Cloud Computing Security Requirements Baseline * Reporting and Continuous Monitoring * Assessment and Authorization Process * Tools of Cloud Computing Risk Assessment * Conclusion * Abbreviations, Glossary and References
Includes: * Introduction to Cloud Computing * Cloud Computing Security * Methodology of Cloud Computing Risk Assessment * Attacks Against the Cloud * ...
|
cena:
161,81 |
![]() |
Spyware
ISBN: 9781466221680 / Angielski / Miękka / 2011 / 92 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general, spyware comes secretly bundled within freeware and shareware software that is downloaded from the Internet. Spyware programs work in the background without your knowledge and collect essential information related to you. This may include your usernames, passwords, bank account numbers, and any other personal and confidential information. This information is usually sent to external sources for malicious purposes. Unlike viruses, spyware...
Spyware is any piece of software that secretly installs itself on your computer and starts tracking and recording your computer activities. In general...
|
cena:
80,80 |
![]() |
Disruptive Technologies, Innovation and Global Redesign: Emerging Implications
ISBN: 9781466601345 / Angielski / Twarda / 2012 / 604 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace affects the others. New technologies have emerged, transforming the ways we do business and, consequently, redesigning the world. Innovation in disruptive technologies pushes new and more agile firms to set new benchmarks and forces established companies to revisit existing models or re-invent themselves to stay competitive. Disruptive Technologies, Innovation and Global Redesign: Emerging Implications provides case studies as well as practical...
In the last few years, most parts of the world have morphed into an electronically interdependent economic unit where a disruption in one marketplace ...
|
cena:
922,53 |
![]() |
Managing Crises and Disasters with Emerging Technologies: Advancements
ISBN: 9781466601673 / Angielski / Twarda / 2012 / 316 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. When a disaster strikes, having every possible resource available is an urgent need for those practitioners and government officials put in charge of aid and recovery to those in need. Managing Crises and Disasters with Emerging Technologies: Advancements offers the most vital, up-to-date research within the field of disaster management technologies. Since the first disaster information network was set up nearly fifteen years ago, information technologies have advanced at an exponential rate, allowing those managing emergencies, crises, and disasters to effectively manage and utilize data in...
When a disaster strikes, having every possible resource available is an urgent need for those practitioners and government officials put in charge of ...
|
cena:
896,90 |
![]() |
Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
ISBN: 9781466601970 / Angielski / Twarda / 2012 / 492 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the...
Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering co...
|
cena:
999,40 |
![]() |
Anonymous Security Systems and Applications: Requirements and Solutions
ISBN: 9781466616493 / Angielski / Twarda / 2012 / 266 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an individual's purchasing habits, associations, or other information has become increasingly less private. As a result, the details of consumers' lives can now be accessed and shared among third party entities whose motivations lie beyond the grasp, and even understanding, of the original owners. Anonymous Security Systems and Applications: Requirements and Solutions outlines the benefits and drawbacks of anonymous security technologies designed...
As modern technologies, such as credit cards, social networking, and online user accounts, become part of the consumer lifestyle, information about an...
|
cena:
999,40 |