
ilość książek w kategorii: 5020
![]() |
Wiretaps & Electronic Eavesdropping: Federal Law & Legal Ethics
ISBN: 9781622579921 / Angielski / Twarda / 2013 / 177 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
695,43 |
![]() |
Information Access and Library User Needs in Developing Countries
ISBN: 9781466643536 / Angielski / Twarda / 2013 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While high quality library and information services continue to thrive and strengthen economic and social development, much of the knowledge that exists on user s needs and behaviors is fundamentally based on the results of users in English-speaking, western developed countries. Information Access and Library User Needs in Developing Countries highlights the struggles that developing countries face in terms of information gaps and information-seeking user behavior. The publication highlights ways in which users in developing countries can benefit from properly implementing LIS services....
While high quality library and information services continue to thrive and strengthen economic and social development, much of the knowledge that exis...
|
cena:
896,90 |
![]() |
What's My Password?
ISBN: 9781482629712 / Angielski / Miękka / 2013 / 62 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of your overall password storage system and discontinue using sticky notes and endless scraps of paper to keep track of passwords. Use "What's My Password?" to help you protect your passwords and login information.
More than just a book to securely store your passwords, the author provides insights, tips and guidance on password security. Make this book a part of...
|
cena:
44,31 |
![]() |
Cloud-Based Services for Your Library: A Lita Guide
ISBN: 9781555708788 / Angielski / Miękka / 2012 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Based on his first-hand experiences migrating the IT infrastructure of Wake Forest University's Z. Smith Reynolds Library, Mitchell's book bridges the gap between organizational and technical issues in decision making for cloud computing in libraries. The guidance he provides will help librarians select the cloud computing solution that is right for their library while matching staff expertise to the customization involved. Written for both librarians and IT staff, this book includes: Specific information about the technical requirements, capabilities, and limitations of different cloud...
Based on his first-hand experiences migrating the IT infrastructure of Wake Forest University's Z. Smith Reynolds Library, Mitchell's book bridges the...
|
cena:
356,97 |
![]() |
Manager's Guide to ISO 22301
ISBN: 9781849284677 / Angielski / Miękka / 2013 / 236 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Have you ever wondered whether your business continuity plan is any good, or whether you've even got a business continuity plan? Anyone can write a simple document, call it a business continuity plan and hope for the best. But, unless you know that it will do what it is supposed to, it may be a wasted investment. This practical guide to the ISO22301 business continuity management system standard shows you how to develop and implement a business continuity management (BCM) and disaster recovery plan; ensuring you get back on your feet with the minimum of fuss, should the unthinkable happen....
Have you ever wondered whether your business continuity plan is any good, or whether you've even got a business continuity plan? Anyone can write a si...
|
cena:
185,92 |
![]() |
Consumer Privacy in the 21st Century: Best Practices for Businesses & Policymakers
ISBN: 9781624172526 / Angielski / Twarda / 2013 / 168 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
1005,27 |
![]() |
Mobile Device Security: Threats & Controls
ISBN: 9781624172540 / Angielski / Miękka / 2013 / 107 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
416,26 |
![]() |
WordPress Security: Protection from Hackers
ISBN: 9781482537062 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Steps You Can Take To Secure Your Website And Keep It Virtually Hack-Proof If you're like most people these days, you always go the extra step to keep yourself, your loved ones, and your possessions safe. You probably lock your doors at night... maybe you even have a home security system. You might have a car alarm installed as well. If I looked at your computer, I'd probably find an antivirus and a running firewall. That covers everything, right?...
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Ste...
|
cena:
40,26 |
![]() |
Introduction to Information Security
ISBN: 9781597499699 / Angielski / Miękka / 2013 / 360 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information. Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in... Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the int... |
cena:
269,33 |
![]() |
Economic Development, Crime, and Policing: Global Perspectives
ISBN: 9781482204568 / Angielski / Twarda / 2014 / 364 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York. Chaired by Dr. Garth den Heyer, the symposium focused on the links between economic development, armed violence, and public safety. Drawn from these proceedings, Economic Development, Crime, and Policing: Global Perspectives presents the insight of police leaders and researchers from a number of countries. They provide worldwide perspectives and case studies about the complex interrelations and influence of these issues on police... The 22nd Annual Meeting of the International Police Executive Symposium was held in August 2012 at the United Nations Plaza in New York.... |
cena:
832,62 |
![]() |
E-Book Platforms for Libraries
ISBN: 9780838958889 / Angielski / Miękka / 2013 / 46 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available to academic, research, public, and K-12 librarise in the United States (an beyond). The focus is on the products that house electronic versions of books also available in print. A directory lists platforms and identifies the type of platform, e-books, subject areas, and library market; main subject areas; and business models. Four summary tables help readers compare options.
Library Technology Reports (vol. 49, no. 3) "E-book Platforms for Libraries" provides an overview of the various types of e-book platforms available t...
|
cena:
176,32 |
![]() |
Untangling the Web: The Nsa's Guide to Gathering Information on Google
ISBN: 9780984284498 / Angielski / Miękka / 2013 / 652 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet. From the basic to the advanced, this 650-page book offers a fascinating look at tricks the "real spies" use to uncover hidden (and not-so-hidden) information online. Chapters include: Google hacks Use the internet like a real spy.
Untangling the Web is the National Security Agency's once-classified guide to finding information on the internet... |
cena:
172,59 |
![]() |
Unmasking the Social Engineer: The Human Element of Security
ISBN: 9781118608579 / Angielski / Miękka / 2014 / 256 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and... Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focu... |
cena:
140,90 |
![]() |
Principles of Wireless Access
ISBN: 9780470697085 / Angielski / Twarda / 2013 / 728 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified Approach is a comprehensive introductory text that takes a holistic approach to the convergence of wireless and fixed Internet technologies.
Updated to reflect developments in wireless wide, local, and personal area networks, the second edition of Principles of Wireless Networks: A Unified ...
|
cena:
499,82 |
![]() |
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
ISBN: 9781118787311 / Angielski / Miękka / 2014 / 384 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop... Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software a... |
cena:
216,53 |
![]() |
Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War
ISBN: 9781466588202 / Angielski / Twarda / 2013 / 408 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offenders. This political violence and terrorism plagues all continents and does not originate solely from jihadist groups. With a view towards developing more effective measures of prevention and resolution, Examining Political Violence: Studies of Terrorism, Counterterrorism, and Internal War examines political violence in various national and international settings. A collection of works, some previously published as articles in the journal... Security is undermined worldwide from political dissident activity and acts of terrorism targeted at innocent victims with no relation to the offen... |
cena:
538,76 |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327404 / Angielski / Miękka / 2013 / 356 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
103,58 |
![]() |
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012
ISBN: 9780989327411 / Angielski / Twarda / 2013 / 354 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Domain reaches back to look at the major "wake-up calls," the major conflicts that have forced the realization that cyberspace is a harsh place where nations and others contest for superiority. The book identifies the key lessons for policymakers, and, most importantly, where these lessons greatly differ from popular myths common in military and political circles.
A Fierce Domain: Conflict in Cyberspace, 1986-2012 is the first book of its kind- a comprehensive, accessible history of cyber conflict. A Fierce Doma...
|
cena:
151,05 |
![]() |
System Forensics, Investigation, and Response
ISBN: 9781284031058 / Angielski / Miękka / 2013 / 315 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-Paced Field Of Computer Forensics Computer Crimes Call For Forensics Specialists, People Who Know How To Find And Follow The Evidence. System Forensics, Investigation, And Response, Second Edition Begins By Examining The Fundamentals Of System Forensics, Such As What Forensics Is, The Role Of Computer Forensics Specialists, Computer Forensic Evidence, And Application Of Forensic Analysis Skills. It Also Gives An Overview Of Computer Crimes,...
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Completely Revised And Rewritten To Keep Pace With The Fast-...
|
cena:
386,93 |
![]() |
Access Control, Authentication, and Public Key Infrastructure: Print Bundle
ISBN: 9781284031591 / Angielski / Miękka / 2013 / 400 str. Termin realizacji zamówienia: ok. 30 dni roboczych. PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Access Control Protects Resources Against Unauthorized Viewing, Tampering, Or Destruction. They Serve As A Primary Means Of Ensuring Privacy, Confidentiality, And Prevention Of Unauthorized Disclosure. Revised And Updated With The Latest Data From This Fast Paced Field, Access Control, Authentication, And Public Key Infrastructure Defines The Components Of Access Control, Provides A Business Framework For Implementation, And Discusses Legal...
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series Meets All Standards Put Forth By CNSS 4011 & 4013A Acces...
|
cena:
386,93 |