• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response Joe Fichera (Joe Fichera is a Certified Computer Examiner (CCE) and member of the ISFCE. He also holds EnCE, ACE, CTT+,  9781597499620 Syngress Media,U.S.
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

ISBN: 9781597499620 / Angielski / Miękka / 2014 / 252 str.

ISBN: 9781597499620/Angielski/Miękka/2014/252 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Joe Fichera (Joe Fichera is a Certified Computer Examiner (C; and Instructor Steven Bolt (is a Computer Forensics Leader

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full...

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have ...

cena: 171,37

 How to Spot Scams Online: First Edition John Gowe 9781466330580 Createspace
How to Spot Scams Online: First Edition

ISBN: 9781466330580 / Angielski / Miękka / 2011 / 50 str.

ISBN: 9781466330580/Angielski/Miękka/2011/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
III John Gower
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Scams are growing more and more each prevalent day. This book will help you fight scams. Instead of becoming a victim of it, This book will inform you on where to report a scam if you come across one. It will also teach you the five major scams that are going on in today's world as we speak. This book is a life saver.
If you are not familiar with online scams, you should read this entire book carefully. This book will teach you how to spot and avoid con-artists. Sca...
cena: 88,98

 Penetration Testing: Protecting Networks and Systems Henry, Kevin M. 9781849283717 Itgp
Penetration Testing: Protecting Networks and Systems

ISBN: 9781849283717 / Angielski / Miękka / 2012 / 211 str.

ISBN: 9781849283717/Angielski/Miękka/2012/211 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kevin M. Henry
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system in the event of a real attack. The Certified Penetration Testing Engineer (CPTE) examination is a widely recognized certification for penetration testers. Penetration Testing: Protecting networks and systems is a preparation guide for the CPTE examination. It describes the range of techniques employed by professional pen testers, and also includes advice on the preparation and delivery of the test report. The author's in-the-field experiences,...
Penetration testing is the simulation of an unethical attack of a computer system or other facility in order to prove the vulnerability of that system...
cena: 161,81

 Developing and Evaluating Security-Aware Software Systems Khaled M. Khan 9781466624825 Information Science Reference
Developing and Evaluating Security-Aware Software Systems

ISBN: 9781466624825 / Angielski / Twarda / 2012 / 368 str.

ISBN: 9781466624825/Angielski/Twarda/2012/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Khaled M. Khan
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.
As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineer...
cena: 999,40

 Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments Ionita, Anca Daniela 9781466624887 Information Science Reference
Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments

ISBN: 9781466624887 / Angielski / Twarda / 2012 / 420 str.

ISBN: 9781466624887/Angielski/Twarda/2012/420 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Anca Daniela Ionita; Marin Litoiu; Grace Lewis
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud computing, many legacy applications will need to migrate these environments to take advantage of the benefits offered by the service environment. Migrating Legacy Applications: Challenges in Service Oriented Architecture and Cloud Computing Environments presents a closer look at the partnership between service oriented architecture and cloud computing environments while analyzing potential solutions to challenges related to the migration of...
As the future of software development in a global environment continues to be influenced by the areas of service oriented architecture (SOA) and cloud...
cena: 999,40

 Cyber Crime, Security and Digital Intelligence Johnson, Mark 9781409454496
Cyber Crime, Security and Digital Intelligence

ISBN: 9781409454496 / Angielski / Twarda / 2013 / 304 str.

ISBN: 9781409454496/Angielski/Twarda/2013/304 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myriad of online risks that threaten us. Cyber crime is one of the main threats to the integrity and availability of data and systems. From insiders to complex external attacks and industrial worms, modern business faces unprecedented challenges; and while cyber security and digital intelligence are the necessary responses to this challenge, they are understood by only a tiny minority. In his second book on high-tech risks, Mark Johnson goes far...
Today's digital economy is uniquely dependent on the Internet, yet few users or decision makers have more than a rudimentary understanding of the myri...
cena: 832,62

 Wireshark Certified Network Analyst Exam Prep Guide (Second Edition) Laura Chappell 9781893939905 Laura Chappell University
Wireshark Certified Network Analyst Exam Prep Guide (Second Edition)

ISBN: 9781893939905 / Angielski / Miękka / 2012 / 186 str.

ISBN: 9781893939905/Angielski/Miękka/2012/186 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Laura Chappell
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst Exam. This Official Exam Prep Guide offers a companion to Wireshark Network Analysis: The Official Wireshark Certified Network Analyst Study Guide (Second Edition)."
This book is intended to provide practice quiz questions based on the thirty-three areas of study defined for the Wireshark Certified Network Analyst ...
cena: 221,82

 Quantum Cryptography and Secret-Key Distillation Gilles Va 9781107410633 Cambridge University Press
Quantum Cryptography and Secret-Key Distillation

ISBN: 9781107410633 / Angielski / Miękka / 2012 / 276 str.

ISBN: 9781107410633/Angielski/Miękka/2012/276 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gilles Van Assche
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with specific focus on secret-key distillation. The book starts with an overview chapter, progressing to classical cryptography, information theory (classical and quantum), and applications of quantum cryptography. The discussion moves to secret-key distillation, privacy...
Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secu...
cena: 380,61

 Optical Code Division Multiple Access: A Practical Perspective Kitayama, Ken-Ichi 9781107026162 CAMBRIDGE UNIVERSITY PRESS
Optical Code Division Multiple Access: A Practical Perspective

ISBN: 9781107026162 / Angielski / Twarda / 2014 / 357 str.

ISBN: 9781107026162/Angielski/Twarda/2014/357 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Ken ichi Kitayama
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-Home (FTTH) systems. Part I starts off with the fundamentals of light propagation in optical fibers, including multiple access protocols, and their enabling techniques. Part II is dedicated to the practical perspectives of Next-Generation Fiber-to-the-Home (FTTH) technology. It covers the key building blocks of OCDMA, devices such as optical encoders and decoders, signal impairments due to noise, and data confidentiality, a unique property of...
A comprehensive guide to optical fiber communications, from the basic principles to the latest developments in OCDMA for Next-Generation Fiber-to-the-...
cena: 632,70

 Mechanisms and Games for Dynamic Spectrum Allocation Tansu Alpcan 9781107034129 CAMBRIDGE UNIVERSITY PRESS
Mechanisms and Games for Dynamic Spectrum Allocation

ISBN: 9781107034129 / Angielski / Twarda / 2013 / 601 str.

ISBN: 9781107034129/Angielski/Twarda/2013/601 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Tansu Alpcan
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and comprehensive book provides a strong foundation for the design of future wireless mechanisms and spectrum markets. Prominent researchers showcase a diverse range of novel insights and approaches to the increasing demand for limited spectrum resources, with a consistent emphasis on theoretical methods, analytical results and practical examples. Covering fundamental underlying principles, licensed spectrum sharing, opportunistic spectrum sharing, and...
Presenting state-of-the-art research into methods of wireless spectrum allocation based on game theory and mechanism design, this innovative and compr...
cena: 553,81

 Federal Information Security: Select Protection & Control Efforts David G Miller, Ivan I Wilson 9781619427716 Nova Science Publishers Inc
Federal Information Security: Select Protection & Control Efforts

ISBN: 9781619427716 / Angielski / Twarda / 2012 / 145 str.

ISBN: 9781619427716/Angielski/Twarda/2012/145 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
David G Miller;Ivan I Wilson
cena: 695,43

 Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection Laing, Christopher 9781466626591 Information Science Reference
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

ISBN: 9781466626591 / Angielski / Twarda / 2012 / 452 str.

ISBN: 9781466626591/Angielski/Twarda/2012/452 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher Laing; Atta Badii; Paul Vickers
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these...
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environme...
cena: 999,40

 Security in Cyberspace: Select Assessments & Policy Considerations Martin E Owens, Deborah R Simpson 9781622573493 Nova Science Publishers Inc
Security in Cyberspace: Select Assessments & Policy Considerations

ISBN: 9781622573493 / Angielski / Twarda / 2013 / 190 str.

ISBN: 9781622573493/Angielski/Twarda/2013/190 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Martin E Owens;Deborah R Simpson
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cyber attacks on Internet commerce, vital business sectors and government agencies have grown exponentially. In the first quarter of this year, security experts were seeing almost 67,000 new malware threats on the Internet every day. This means more than 45 new viruses, worms, spy-ware and other threats were being created every minute. As these threats grow, security policy, technology and procedures need to evolve even faster to stay ahead of the...
Today, the Internet is at a crossroads. Protecting security of consumers, businesses and the Internet infrastructure has never been more difficult. Cy...
cena: 783,58

 Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática Castro Reynoso, Sergio 9781479122998 Createspace Independent Publishing Platform
Los 27 Controles Criticos de Seguridad Informatica: Una Guía Práctica para Gerentes y Consultores de Seguridad Informática

ISBN: 9781479122998 / Hiszpański / Miękka / 2012 / 116 str.

ISBN: 9781479122998/Hiszpański/Miękka/2012/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sergio Castro Reynoso
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas rapido posible los datos de su empresa u organizacion, utilizando 27 controles criticos. Es una metodologia 100% practica y enfocada a obtener resultados inmediatos."
El objetivo de este libro es presentar una metodologia facil de implementar, que le permita al responsable de seguridad informatica asegurar lo mas ra...
cena: 52,40

 Guide to Network Defense and Countermeasures Dean (Heald College, San Francisco) Farwood 9781133727941 Cengage Learning, Inc
Guide to Network Defense and Countermeasures

ISBN: 9781133727941 / Angielski / Miękka / 2013 / 576 str.

ISBN: 9781133727941/Angielski/Miękka/2013/576 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
San Francisco) Farwood Dean (Heald College
cena: 293,81

 Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM Carol J. Buck 9781455722884 W.B. Saunders Company
Facility Coding Exam Review 2013: The Certification Step with ICD-9-CM

ISBN: 9781455722884 / Angielski / Miękka / 2012 / 640 str.

ISBN: 9781455722884/Angielski/Miękka/2012/640 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Carol J. Buck

With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass the AHIMA CCS certification exam and take your coding career to the next step. CCS Coding Exam Review 2013: The Certification Step with ICD-9-CM features an easy-to-follow outline format that guides you through the anatomy, terminology, and pathophysiology for each organ system; reimbursement concepts; an overview of CPT, ICD-9-CM, and HCPCS coding; and more. Two full practice exams and a final exam modeled on the actual CCS exam simulate...

With the expert insight of leading coding educator Carol J. Buck, this complete exam review highlights the content you'll need to master to pass th...

cena: 278,34

 Effective Monitoring and Alerting: For Web Operations Ligus, Slawek 9781449333522 O'Reilly Media
Effective Monitoring and Alerting: For Web Operations

ISBN: 9781449333522 / Angielski / Miękka / 2013 / 140 str.

ISBN: 9781449333522/Angielski/Miękka/2013/140 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.

With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on his extensive experience in systems ops at large technology companies, author Slawek Ligus describes an effective data-driven approach for monitoring and alerting that enables you to maintain high availability and deliver a high quality of service.

Learn methods for measuring state changes and data flow in your system, and set up alerts to help you recover quickly from problems when they do arise. If you're a system operator waging the...

With this practical book, you'll discover how to catch complications in your distributed system before they develop into costly problems. Based on ...

cena: 90,23

 Web Service APIs and Libraries Jason Paul Michel 9780838911822 American Library Association
Web Service APIs and Libraries

ISBN: 9780838911822 / Angielski / Miękka / 2012 / 125 str.

ISBN: 9780838911822/Angielski/Miękka/2012/125 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jason Paul Michel
This book shows how to enhance an institution's presence on the Web with tools that integrate a variety of handy, popular programs. Application Programming Interfaces (APIs) are software tools that help different programs work together, and Michel shows readers how to integrate these into existing libray websites as well as use them to launch new kinds of services. With step by step guidance, this book *Uses real-world examples to show how APIs can be used to promote library materials and events, visualize data, educate patrons, and mobilize library services *Demonstrates how to create and...
This book shows how to enhance an institution's presence on the Web with tools that integrate a variety of handy, popular programs. Application Progra...
cena: 235,10

 Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission Julie C Hartell 9781626183902 Nova Science Publishers Inc
Mobile Privacy Disclosures: Recommendations of the Federal Trade Commission

ISBN: 9781626183902 / Angielski / Miękka / 2013 / 81 str.

ISBN: 9781626183902/Angielski/Miękka/2013/81 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Julie C Hartell
cena: 416,26

 Steganography & Watermarking Ching-Nung Yang, Chia-Chen Lin, Chin-Chen Chang 9781626183131 Nova Science Publishers Inc
Steganography & Watermarking

ISBN: 9781626183131 / Angielski / Twarda / 2013 / 363 str.

ISBN: 9781626183131/Angielski/Twarda/2013/363 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Ching-Nung Yang;Chia-Chen Lin;Chin-Chen Chang
cena: 1239,07

Podprzednia  25  26  27  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia