
ilość książek w kategorii: 5001
![]() |
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
ISBN: 9780470080238 / Angielski / Miękka / 2007 / 752 str. Termin realizacji zamówienia: ok. 30 dni roboczych.
|
cena:
170,13 |
![]() |
Database Design and Development: An Essential Guide for It Professionals
ISBN: 9780471218777 / Angielski / Twarda / 2003 / 768 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The first and only database primer for today's global economy
Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary responsibility for the design and maintenance of these databases rests with a company's information technology department. Unlike other IT resources currently available that tend to focus on a particular product, Database Design and Development: An Essential Guide for IT Professionals was... The first and only database primer for today's global economy
Today's businesses depend on their databases to provide information essential for the... |
cena:
757,60 |
![]() |
Foundations of Cryptography: Volume 1, Basic Tools
ISBN: 9780521035361 / Angielski / Miękka / 2007 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...
|
cena:
318,37 |
![]() |
Information Systems Development and Data Modeling: Conceptual and Philosophical Foundations
ISBN: 9780521373692 / Angielski / Twarda / 1995 / 304 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to present a comparative philosophical study of the various approaches. On the philosophical level, the authors explore the epistemology, ontology, and rationality of each modeling approach. While on the theoretical computer science level, a systematic study of the history and development of three major strands of data modeling is presented. This book will be of great interest to all computer scientists using information systems as well as...
Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to pre...
|
cena:
544,53 |
![]() |
Complexity and Cryptography: An Introduction
ISBN: 9780521617710 / Angielski / Miękka / 2006 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Und...
|
cena:
350,74 |
![]() |
Updating Logical Databases
ISBN: 9780521619721 / Angielski / Miękka / 2005 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the desired change intentionally using a "formula-based" approach to updating needs rather than a "model-based" technique. The complexity of the algorithms, choice of semantics and means of enforcing integrity constraints are also discussed.
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating ne...
|
cena:
213,72 |
![]() |
Secure Communicating Systems: Design, Analysis, and Implementation
ISBN: 9780521807319 / Angielski / Twarda / 2001 / 296 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A...
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in progra...
|
cena:
349,66 |
![]() |
The Geometry of Information Retrieval
ISBN: 9780521838054 / Angielski / Twarda / 2004 / 150 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the general principles of quantum mechanics. All the standard results can be applied to address problems in IR, such as pseudo-relevance feedback, relevance feedback and ostensive retrieval. The relation with quantum computing is examined. Appendices with background material on physics and mathematics are also included.
Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the gener...
|
cena:
358,93 |
![]() |
Java and Internet Security
ISBN: 9780595135004 / Angielski / Miękka / 2000 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
76,25 |
![]() |
Cobb's Guide to PC and LAN Security
ISBN: 9780595181506 / Angielski / Miękka / 2001 / 736 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
160,34 |
![]() |
The Weakest Security Link Series: 1st Edition
ISBN: 9780595264940 / Angielski / Miękka / 2003 / 200 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free...
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understandin...
|
cena:
68,61 |
![]() |
The Expert Guide to PeopleSoft Security
ISBN: 9780595324408 / Angielski / Miękka / 2004 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.
"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge... Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
|
cena:
76,25 |
![]() |
Information Security For The Little Guy
ISBN: 9780595386246 / Angielski / Miękka / 2006 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
|
cena:
38,03 |
![]() |
The Expert Guide to PeopleSoft Security
ISBN: 9780595665792 / Angielski / Twarda / 2004 / 116 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.
"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge... Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
|
cena:
114,47 |
![]() |
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs
ISBN: 9780596000455 / Angielski / Miękka / 2001 / 788 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet... Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business... |
cena:
206,17 |
![]() |
Hardening Cisco Routers
ISBN: 9780596001667 / Angielski / Miękka / 2002 / 194 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement... |
cena:
95,36 |
![]() |
Web Performance Tuning
ISBN: 9780596001728 / Angielski / Miękka / 2002 / 482 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features, and consequently longer waits on the Web. Improved performance has become a critical factor in determining the usability of the Web in general and of individual sites in particular.Web Performance Tuning, 2nd Edition is about getting the best possible performance from the Web. This book isn't just about tuning web server software; it's also about streamlining web content, getting optimal performance from a browser, tuning both client and... As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features,... |
cena:
171,95 |
![]() |
Network Security with Openssl: Cryptography for Secure Communications
ISBN: 9780596002701 / Angielski / Miękka / 2002 / 386 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it... Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats... |
cena:
152,69 |
![]() |
Linux Security Cookbook
ISBN: 9780596003913 / Angielski / Miękka / 2003 / 336 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of... Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one s... |
cena:
156,68 |
![]() |
Secure Programming Cookbook for C & C++
ISBN: 9780596003944 / Angielski / Miękka / 2003 / 792 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult. Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks.... |
cena:
293,81 |