
ilość książek w kategorii: 5020
![]() |
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response
ISBN: 9781597499620 / Angielski / Miękka / 2014 / 252 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full... Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have ... |
cena:
171,37 |
![]() |
How to Spot Scams Online: First Edition
ISBN: 9781466330580 / Angielski / Miękka / 2011 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Scams are growing more and more each prevalent day. This book will help you fight scams. Instead of becoming a victim of it, This book will inform you on where to report a scam if you come across one. It will also teach you the five major scams that are going on in today's world as we speak. This book is a life saver.
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Sca...
|
cena:
88,98 |
![]() |
Penetration Testing: Protecting Networks and Systems
ISBN: 9781849283717 / Angielski / Miękka / 2012 / 211 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
|
cena:
161,81 |
![]() |
Developing and Evaluating Security-Aware Software Systems
ISBN: 9781466624825 / Angielski / Twarda / 2012 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineer...
|
cena:
999,40 |
![]() |
Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments
ISBN: 9781466624887 / Angielski / Twarda / 2012 / 420 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of...
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud...
|
cena:
999,40 |
![]() |
Cyber Crime, Security and Digital Intelligence
ISBN: 9781409454496 / Angielski / Twarda / 2013 / 304 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far...
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myri...
|
cena:
832,62 |
![]() |
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)
ISBN: 9781893939905 / Angielski / Miękka / 2012 / 186 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
|
cena:
221,82 |
![]() |
Quantum Cryptography and Secret-Key Distillation
ISBN: 9781107410633 / Angielski / Miękka / 2012 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy...
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secu...
|
cena:
380,61 |
![]() |
Optical Code Division Multiple Access: A Practical Perspective
ISBN: 9781107026162 / Angielski / Twarda / 2014 / 357 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-Home (FTTH) systems. Part I starts off with the fundamentals of light propagation in optical fibers, including multiple access protocols, and their enabling techniques. Part II is dedicated to the practical perspectives of Next-Generation Fiber-to-the-Home (FTTH) technology. It covers the key building blocks of OCDMA, devices such as optical encoders and decoders, signal impairments due to noise, and data confidentiality, a unique property of...
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-...
|
cena:
632,70 |
![]() |
Mechanisms and Games for Dynamic Spectrum Allocation
ISBN: 9781107034129 / Angielski / Twarda / 2013 / 601 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and comprehensive book provides a strong foundation for the design of future wireless mechanisms and spectrum markets. Prominent researchers showcase a diverse range of novel insights and approaches to the increasing demand for limited spectrum resources, with a consistent emphasis on theoretical methods, analytical results and practical examples. Covering fundamental underlying principles, licensed spectrum sharing, opportunistic spectrum sharing, and...
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and compr...
|
cena:
553,81 |
![]() |
Federal Information Security: Select Protection & Control Efforts
ISBN: 9781619427716 / Angielski / Twarda / 2012 / 145 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
695,43 |
![]() |
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 9781466626591 / Angielski / Twarda / 2012 / 452 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
|
cena:
999,40 |
![]() |
Security in Cyberspace: Select Assessments & Policy Considerations
ISBN: 9781622573493 / Angielski / Twarda / 2013 / 190 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
|
cena:
783,58 |
![]() |
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática
ISBN: 9781479122998 / Hiszpański / Miękka / 2012 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
|
cena:
52,40 |
![]() |
Guide to Network Defense and Countermeasures
ISBN: 9781133727941 / Angielski / Miękka / 2013 / 576 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
293,81 |
![]() |
Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM
ISBN: 9781455722884 / Angielski / Miękka / 2012 / 640 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass the AHIMA CCS certification exam and take your coding career to the next step. CCS Coding Exam Review 2013: The Certification Step with ICD-9-CM features an easy-to-follow outline format that guides you through the anatomy, terminology, and pathophysiology for each organ system; reimbursement concepts; an overview of CPT, ICD-9-CM, and HCPCS coding; and more. Two full practice exams and a final exam modeled on the actual CCS exam simulate... With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass th... |
cena:
278,34 |
![]() |
Effective Monitoring and Alerting: For Web Operations
ISBN: 9781449333522 / Angielski / Miękka / 2013 / 140 str. Termin realizacji zamówienia: ok. 30 dni roboczych. With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability and deliver a high quality of service. Learn methods for measuring state changes and data flow in your system, and set up alerts to help you recover quickly from problems when they do arise. If you're a system operator waging the... With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on ... |
cena:
90,23 |
![]() |
Web Service APIs and Libraries
ISBN: 9780838911822 / Angielski / Miękka / 2012 / 125 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book shows how to enhance an institution's presence on the Web with tools that integrate a variety of handy, popular programs. Application Programming Interfaces (APIs) are software tools that help different programs work together, and Michel shows readers how to integrate these into existing libray websites as well as use them to launch new kinds of services. With step by step guidance, this book *Uses real-world examples to show how APIs can be used to promote library materials and events, visualize data, educate patrons, and mobilize library services *Demonstrates how to create and...
This book shows how to enhance an institution's presence on the Web with tools that integrate a variety of handy, popular programs. Application Progra...
|
cena:
235,10 |
![]() |
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission
ISBN: 9781626183902 / Angielski / Miękka / 2013 / 81 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
416,26 |
![]() |
Steganography & Watermarking
ISBN: 9781626183131 / Angielski / Twarda / 2013 / 363 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1239,07 |