• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Crime Prevention Technologies and Applications for Advancing Criminal Investigation Chang-Tsun Li 9781466617582 Information Science Reference
Crime Prevention Technologies and Applications for Advancing Criminal Investigation

ISBN: 9781466617582 / Angielski / Twarda / 2012 / 350 str.

ISBN: 9781466617582/Angielski/Twarda/2012/350 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Chang-Tsun Li
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the most complete evidence is brought to trial. Paramount also the need for investigators to ensure that evidence adheres to the boundaries of the legal system, a place where policy often lags behind new innovations. Crime Prevention Technologies and Applications for Advancing Criminal Investigation addresses the use of electronic devices and software for crime prevention, investigation, and the application of a broad spectrum of sciences to answer...
The tools of crime constantly evolve, and law enforcement and forensic investigators must understand advanced forensic techniques to ensure that the m...
cena: 999,40

 Ethical Impact of Technological Advancements and Applications in Society Rocci Luppicini 9781466617735 Information Science Reference
Ethical Impact of Technological Advancements and Applications in Society

ISBN: 9781466617735 / Angielski / Twarda / 2012 / 358 str.

ISBN: 9781466617735/Angielski/Twarda/2012/358 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rocci Luppicini
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer...
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, g...
cena: 999,40

 Post-Quantum Cryptography Using Complexity Dr Michael James D 9781469959139 Createspace
Post-Quantum Cryptography Using Complexity

ISBN: 9781469959139 / Angielski / Miękka / 2009 / 144 str.

ISBN: 9781469959139/Angielski/Miękka/2009/144 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael James De Mare
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
cena: 64,70

 E-Commerce Security: Advice from Experts Khosrow-Pour, Mehdi 9781591402411 Cybertech Publishing
E-Commerce Security: Advice from Experts

ISBN: 9781591402411 / Angielski / Twarda / 2003 / 196 str.

ISBN: 9781591402411/Angielski/Twarda/2003/196 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mehdi Khosrow-Pour; Lawrence Oliva
Provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and solutions.
Provides insight and practical knowledge obtained from industry leaders regarding the overall successful management of e-commerce practices and soluti...
cena: 115,42

 Web and Information Security Elena Ferrari Bhavani Thuraisingham 9781591405887 IRM Press
Web and Information Security

ISBN: 9781591405887 / Angielski / Twarda / 2005 / 318 str.

ISBN: 9781591405887/Angielski/Twarda/2005/318 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Elena Ferrari; Bhavani Thuraisingham
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaining to Web and information systems security. In particular, security for the semantic Web, privacy, security policy management and emerging topics such as secure semantic grids and secure multimedia systems are also discussed. As well as covering basic concepts of Web and information system security, this book provides new insights into the semantic Web field and its related security challenges. Web and Information Security is valuable as a...
Web and Information Security consists of a collection of papers written by leading experts in the field that describe state-of-the-art topics pertaini...
cena: 458,84

 Web Semantics Ontology David Taniar Johanna Wenny Rahayu 9781591409052 IGI Global
Web Semantics Ontology

ISBN: 9781591409052 / Angielski / Twarda / 2006 / 300 str.

ISBN: 9781591409052/Angielski/Twarda/2006/300 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
David Taniar; Johanna Wenny Rahayu
Web Semantics & Ontology provides an excellent overview of current research and development activities, while covering an extensive range of topics including ontological modeling, enterprise systems, querying and knowledge discovery, and a wide range of applications. Each chapter contains a thorough study of the topic, systematic proposed work, and a comprehensive list of references. The theoretical and practical aspects of Web semantics and ontology development combine to bring a unique perspective to this book. Researchers, software developers, and IT students who want to enhance their...
Web Semantics & Ontology provides an excellent overview of current research and development activities, while covering an extensive range of topics in...
cena: 458,84

 Steganography Karen Bailey Kevin Curran 9781594576676 Booksurge Publishing
Steganography

ISBN: 9781594576676 / Angielski / Miękka / 2005 / 120 str.

ISBN: 9781594576676/Angielski/Miękka/2005/120 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Karen Bailey; Kevin Curran
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process which can be used for example by civil rights organizations in repressive states to communicate their message to the outside world without their own government being aware of it. Less virtuously it can be used by terrorists to communicate with one another without anyone else's knowledge. In both cases the objective is not to make it difficult to...
Steganography is a process which involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be se...
cena: 40,43

 Software Security Engineering: Design & Applications Muthu Ramachandran 9781614701286 Nova Science Publishers Inc
Software Security Engineering: Design & Applications

ISBN: 9781614701286 / Angielski / Twarda / 2011 / 272 str.

ISBN: 9781614701286/Angielski/Twarda/2011/272 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Muthu Ramachandran
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics as: systematic approaches to engineering; building and assuring software security throughout software lifecycle; software security based requirements engineering; and, design for software security.
Provides design guidelines on software security which can benefit practitioners, researchers, learners, and educators. This book discusses such topics...
cena: 499,52

 Strategies for Trusted Identities & Infrastructure in Cyberspace Robert J Kask 9781614701743 Nova Science Publishers Inc
Strategies for Trusted Identities & Infrastructure in Cyberspace

ISBN: 9781614701743 / Angielski / Twarda / 2012 / 147 str.

ISBN: 9781614701743/Angielski/Twarda/2012/147 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Robert J Kask
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the national strategies for cyberspace policy review and trusted identities in cyberspace striving to enhance online choice, efficiency, security and privacy.
Cyberspace provides a platform for innovation and prosperity and the means to improve general welfare around the globe. This book explores the nationa...
cena: 661,14

 Digital Document Analysis & Processing Wellington dos Pinheiro dos Santos, Carlos Alexandre Barros de Mello, Adriano Lorena Inacio de Oliveira 9781621003267 Nova Science Publishers Inc
Digital Document Analysis & Processing

ISBN: 9781621003267 / Angielski / Twarda / 2012 / 356 str.

ISBN: 9781621003267/Angielski/Twarda/2012/356 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Wellington dos Pinheiro dos Santos;Carlos Alexandre Barros de Mello;Adriano Lorena Inacio de Oliveira
One possible solution to the increased amount of paper generated by mankind over the years is to use the computer and its associated possibility of storing digital information. This book covers the main aspects of document analysis and processing, including digitisation, storage, thresholding, filtering, segmentation and automatic recognition.
One possible solution to the increased amount of paper generated by mankind over the years is to use the computer and its associated possibility of st...
cena: 999,09

 Cryptography: Protocols, Design & Applications Kamol Lek, Naruemol Rajapakse 9781621007791 Nova Science Publishers Inc
Cryptography: Protocols, Design & Applications

ISBN: 9781621007791 / Angielski / Twarda / 2013 / 242 str.

ISBN: 9781621007791/Angielski/Twarda/2013/242 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Kamol Lek;Naruemol Rajapakse
cena: 1005,27

 The Hidden Corporation: A Data Management Security Novel Schlesinger, David 9781935504184 Technics Publications, LLC
The Hidden Corporation: A Data Management Security Novel

ISBN: 9781935504184 / Angielski / Miękka / 2011 / 192 str.

ISBN: 9781935504184/Angielski/Miękka/2011/192 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Schlesinger

If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful book shines a bright light on the hidden processes in most companies where data governance and information security are usually absent. These gaps are often the root cause of sensitive data loss.

Follow cybersecurity specialist Nancy MacBaron who fights in the corporate trenches against criminal hackers intent on stealing her company's sensitive information, yet discovers hidden data security gaps in her corporation while investigating a...

If you wonder why good companies lose lots of personal information, and are not sure if your company is immune from this disaster, this insightful ...

cena: 73,03

 Complete Guide to Internet Privacy, Anonymity & Security Matthew Bailey 9783950309300 Nerel Online
Complete Guide to Internet Privacy, Anonymity & Security

ISBN: 9783950309300 / Angielski / Miękka / 2011 / 306 str.

ISBN: 9783950309300/Angielski/Miękka/2011/306 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Matthew Bailey
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get downloads without censorship or restriction, prevent identity theft and keep cyber-criminals from hacking into a computer, and stop search engines, social networking sites, and powerful Internet players from tracking and profiling users.
Millions of people have their identities stolen every year. This comprehensive and easy-to-read guide explains how to surf the Internet freely and get...
cena: 77,03

 Security for Mobility  9780863413377 Institution of Engineering and Technology
Security for Mobility

ISBN: 9780863413377 / Angielski / Twarda / 2003 / 466 str.

ISBN: 9780863413377/Angielski/Twarda/2003/466 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book covers many aspects of security for mobility including current developments, underlying technologies, network security, mobile code issues, application security and the future.
As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blu...
cena: 568,25

 Error-Correcting Codes, Finite Geometries and Cryptography  9780821849569 American Mathematical Society
Error-Correcting Codes, Finite Geometries and Cryptography

ISBN: 9780821849569 / Angielski / Miękka / 2010 / 244 str.

ISBN: 9780821849569/Angielski/Miękka/2010/244 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are new contributions on privacy reconciliation, resilient functions, cryptographic hash functions, and new work on quantum coins. Related original work in finite geometries concerns two-weight codes coming from partial spreads, (0,1) matrices with forbidden configurations, AndrU embeddings, and...
The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block desi...
cena: 563,24

 
Applied Cryptology, Cryptographic Protocols, and Computer Security Models

ISBN: 9780821800416 / Angielski / Miękka / 1983 / 192 str.

ISBN: 9780821800416/Angielski/Miękka/1983/192 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
cena: 543,65

 Non-commutative Cryptography and Complexity of Group-theoretic Problems  9780821853603 American Mathematical Society
Non-commutative Cryptography and Complexity of Group-theoretic Problems

ISBN: 9780821853603 / Angielski / Twarda / 2011 / 413 str.

ISBN: 9780821853603/Angielski/Twarda/2011/413 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. In particular, a lot...
This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, ...
cena: 563,24

 Indexing Multimedia and Creative Works: The Problems of Meaning and Interpretation Rafferty, Pauline 9780754632542 Ashgate Publishing Limited
Indexing Multimedia and Creative Works: The Problems of Meaning and Interpretation

ISBN: 9780754632542 / Angielski / Twarda / 2005 / 224 str.

ISBN: 9780754632542/Angielski/Twarda/2005/224 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verbal media. The authors of Indexing Multimedia and Creative Works explore these challenges against a background of different theories of language and communication, particularly semiotics, questioning the possibility of ideal multimedia indexing. After surveying traditional approaches to information retrieval (IR) and organization in relation to issues of meaning, particularly Panofskya s a levels of meaninga, Pauline Rafferty and Rob Hidderley...
Indexing and information retrieval work properly only if language and interpretation are shared by creator and user. This is more complex for non-verb...
cena: 710,17

 Visual Interface Design for Digital Cultural Heritage: A Guide to Rich-Prospect Browsing Ruecker, Stan 9781409404224 Ashgate Publishing Limited
Visual Interface Design for Digital Cultural Heritage: A Guide to Rich-Prospect Browsing

ISBN: 9781409404224 / Angielski / Twarda / 2011 / 206 str.

ISBN: 9781409404224/Angielski/Twarda/2011/206 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Browsing for information is a significant part of most research activity, but many online collections hamper browsing with interfaces that are variants on a search box. Research shows that rich-prospect interfaces can offer an intuitive and highly flexible alternative environment for information browsing, assisting hypothesis formation and pattern-finding. This unique book offers a clear discussion of this form of interface design, including a theoretical basis for why it is important, and examples of how it can be done. It will be of interest to those working in the fields of library and...
Browsing for information is a significant part of most research activity, but many online collections hamper browsing with interfaces that are variant...
cena: 734,66

 Networks, Security and Complexity: The Role of Public Policy in Critical Infrastructure Protection  9781843769521 Edward Elgar Publishing Ltd
Networks, Security and Complexity: The Role of Public Policy in Critical Infrastructure Protection

ISBN: 9781843769521 / Angielski / Twarda / 2005 / 160 str.

ISBN: 9781843769521/Angielski/Twarda/2005/160 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
In 1997, for his doctoral dissertation in public policy from George Mason University, Gorman (public policy, George Mason U.) began constructing a map of all the interdependent telecommunications and information technology networks, gas pipelines, railroad systems, and electric power lines in the US. After 9-11, he extended that effort to assist th
In 1997, for his doctoral dissertation in public policy from George Mason University, Gorman (public policy, George Mason U.) began constructing a map...
cena: 520,71

Podprzednia  25  26  27  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia