
ilość książek w kategorii: 5020
![]() |
Cyberspace and Security: A Fundamentally New Approach
ISBN: 9780985893002 / Angielski / Miękka / 2012 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov's comprehensive multi-disciplinary...
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes...
|
cena:
113,30 |
![]() |
Nmap 6: Network Exploration and Security Auditing Cookbook
ISBN: 9781849517485 / Angielski / Miękka / 2012 / 318 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to perform additional tasks using the collected host information. Tasks like advanced fingerprinting and service discovery, information gathering, and detection of security vulnerabilities. "Nmap 6: Network exploration and security auditing cookbook" will help you master Nmap and its scripting engine. You will learn how to use this tool to do a wide variety of practical tasks for pentesting and network monitoring. Finally, after harvesting the...
Nmap is a well known security tool used by penetration testers and system administrators. The Nmap Scripting Engine (NSE) has added the possibility to...
|
cena:
211,44 |
![]() |
Knowledge Discovery in Multiple Databases
ISBN: 9781447110507 / Angielski / Miękka / 2012 / 233 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the Web is rapidly becoming an information flood, individuals and organizations can take into account low-cost information and knowledge on the Internet when making decisions. How to efficiently identify quality knowledge from different data sources has become a significant challenge. This challenge has attracted a great many researchers including the au- thors who have developed a local pattern analysis, a new strategy for dis- covering some kinds...
Many organizations have an urgent need of mining their multiple databases inherently distributed in branches (distributed data). In particular, as the...
|
cena:
402,53 |
![]() |
Kish Cypher, The: The Story of Kljn for Unconditional Security
ISBN: 9789814449458 / Angielski / Twarda / 2017 / 464 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based competitors for particular applications, from the perspective of Dr. Kish himself.This book clarifies the misinformation behind heated debates on the 'Kish Cypher' (the popular but incorrect name for the Kirchhoff-Law-Johnson-Noise, KLJN, scheme), and debunks common misconceptions by using simple and clear-cut...
Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its uncondit...
|
cena:
710,17 |
![]() |
Security, Design, and Architecture for Broadband and Wireless Network Technologies
ISBN: 9781466639027 / Angielski / Twarda / 2013 / 386 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there still remains to be a comprehensive understanding of its various dimensions and environments. Security, Design, and Architecture for Broadband and Wireless Network Technologies provides a discussion on the latest research achievements in wireless networks and broadband technology. Highlighting new trends, applications, developments, and standards, this book is essential for next generation researchers and practitioners in the ICT field.
While wireless technologies continue to provide an array of new challenges and multi-domain applications for business processes and solutions, there s...
|
cena:
973,78 |
![]() |
Social Network Engineering for Secure Web Data and Services
ISBN: 9781466639263 / Angielski / Twarda / 2013 / 324 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the internet; these platforms are not only used for content sharing purposes. They are also used to support and develop new services and applications. Social Network Engineering for Secure Web Data and Services provides empirical research on the engineering of social network infrastructures, the development of novel applications, and the impact of social network- based services over the internet. This comprehensive collection highlights issues and...
While the innovation and phenomenon of social network applications has greatly impacted society, the economy, and the technological pool of the intern...
|
cena:
999,40 |
![]() |
Arquitectura de Seguridad Informática: Un manual para gerentes, directores y consultores
ISBN: 9781482069976 / Hiszpański / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio y crecimiento, en contra de todo tipo de ataques. Para hacer esto, se tiene una variedad extensa de posibles soluciones, y varias metodologias. A veces parece que la velocidad de cambio de nuestro medio ambiente de red es tal que no nos podemos mantener al dia. Y para complicar las cosas, los auditores quieren cada proceso y control documentado y mantenido al dia. El objetivo de este libro es darle al arquitecto de seguridad informatica una...
La funcion de gerente o director de seguridad informatica es dificil. Uno es responsable de salvaguardar la informacion de una red en constante cambio...
|
cena:
52,40 |
![]() |
Microsoft Forefront Uag Mobile Configuration Starter
ISBN: 9781849688789 / Angielski / Miękka / 2013 / 86 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
129,43 |
![]() |
Official (Isc)2(r) Guide to the Cissp(r)-Issmp(r) Cbk(r)
ISBN: 9781466578951 / Angielski / Twarda / 2015 / 456 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP(r)) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management. Candidates for the ISSMP need to demonstrate a thorough understanding of the five domains of the ISSMP Common Body of Knowledge (CBK(r)), along with the ability to apply this in-depth knowledge to establish, present, and govern information security programs, while demonstrating management and leadership skills.... The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP(r)) certification was dev... |
cena:
381,97 |
![]() |
C(I)SO - And Now What?: How to Successfully Build Security by Design
ISBN: 9781480237414 / Angielski / Miękka / 2013 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and look for guidance, or you are considering yourself an expert and just wish to verify that you haven't forgotten anything - this book will help you to tackle the subject right - by building "security by design." The content covers your initial phases in the job such as setting expectations, base lining, gap analysis, capabilities building, and org chart variances. It then leads you to define security architecture, addressing a secure development...
Have you ever wondered why so many companies and their security leaders fail in today's cyber challenges? Regardless if you are new in this role and l...
|
cena:
150,68 |
![]() |
Access Control: Understanding Information Sensitivity
ISBN: 9781530480142 / Angielski / Miękka / 2016 / 164 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
145,67 |
![]() |
Hacking
ISBN: 9781365046612 / Angielski / Twarda / 2016 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker.
Hacking... |
cena:
153,22 |
![]() |
Street Cryptography: A Quick and Dirty Way to Maintain Your Secret Conspiracy
ISBN: 9781478210153 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
32,33 |
![]() |
The Super3: Information Skills for Young Learners
ISBN: 9781586832865 / Angielski / Miękka / 2007 / 128 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Use "The Super3," a spin off from the widely used "Big6," to help students in grades PreK-2 develop crucial problem-solving skills. Learn how to break down the problem-solving process so that younger students get it and remember it. Discover a process model for children to learn and use in order to be successful with the various tasks they undertake. "The Super3" helps younger students recognize what they are doing so they can label and talk about their research. Provides an easy transition into the "Big6." Ready-to-use worksheets include explanations for daily implementation of the... Use "The Super3," a spin off from the widely used "Big6," to help students in grades PreK-2 develop crucial problem-solving skills. Learn how to br... |
cena:
180,44 |
![]() |
Advances in Communications, Computing, Networks and Security Volume 8
ISBN: 9781841022932 / Angielski / Miękka / 2012 / 294 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
129,43 |
![]() |
Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis (WDFIA 2012)
ISBN: 9781841023168 / Angielski / Miękka / 2012 / 158 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,24 |
![]() |
Proceedings of the Ninth International Network Conference (INC 2012)
ISBN: 9781841023151 / Angielski / Miękka / 2012 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,24 |
![]() |
Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012)
ISBN: 9781841023175 / Angielski / Miękka / 2012 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,24 |
![]() |
Using Libguides to Enhance Library Services: A Lita Guide
ISBN: 9781555708801 / Angielski / Miękka / 2013 / 328 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The easy-to-use tools in Springshare's LibGuides help you organize web pages, improve students' research experience and learning, and offer an online community of librarians sharing their work and ideas. Editors Dobbs, Sittler, and Cook have recruited expert contributors to address specific applications, creating a one-stop reference.
The easy-to-use tools in Springshare's LibGuides help you organize web pages, improve students' research experience and learning, and offer an online ...
|
cena:
264,47 |
![]() |
Data Security Breaches: Notification Laws, Legislation & Identity Theft
ISBN: 9781622577354 / Angielski / Twarda / 2013 / 131 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
695,43 |