ilość książek w kategorii: 3854
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint
ISBN: 9780387952819 / Angielski / Twarda / 2001 / 333 str. Termin realizacji zamówienia: ok. 20 dni roboczych. In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of...
In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins Un...
|
|
cena:
389,98 zł |
Nontraditional Database Systems
ISBN: 9780415302067 / Angielski / Twarda / 2002 / 270 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nontraditional Database Systems is the fifth volume in the Advanced Information Processing Technology series. It brings together the results of research carried out by the Japanese database research community in the field of nontraditional database systems. The book examines nontraditional types of applications, data types, systems and environments together with high-performance architecture to support nontraditional applications, such as web mining, data engineering and object processing.
Nontraditional Database Systems is the fifth volume in the Advanced Information Processing Technology series. It brings together the results of resear...
|
|
cena:
891,96 zł |
The Young Person's Guide to the Internet: The Essential Website Reference Book for Young People, Parents and Teachers
ISBN: 9780415345057 / Angielski / Miękka / 2005 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In this easy-to-use reference, over 1600 websites have been carefully researched and selected with educational and recreational needs in mind. Sorted into thirty categories including all National Curriculum subjects, the book provides brief descriptions of each website and the resources you can expect to find there. Some of the wide-ranging categories include art, attractions, careers and students, environment, film, TV and radio, reference and revision. The format is unique and simple, making this a perfect resource for young people, parents and teachers and an excellent support... In this easy-to-use reference, over 1600 websites have been carefully researched and selected with educational and recreational needs in mind. Sort... |
|
cena:
167,84 zł |
IT Disaster Recovery Planning For Dummies
ISBN: 9780470039731 / Angielski / Miękka / 2007 / 384 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych (Dostawa przed świętami) If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disaster recovery planning is pretty vital. But it's easy to put it off. After all, where do you start?
IT Disaster Recovery Planning For Dummies shows you how to get started by creating a safety net while you work out the details of your major plan. The right plan will get your business back on track quickly, whether you're hit by a tornado or a disgruntled employee with super hacking powers. Here's how to assess the situation, develop... If you have a business or a nonprofit organization, or if you're the one responsible for information systems at such an operation, you know that disas...
|
|
cena:
108,36 zł |
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
ISBN: 9780470080238 / Angielski / Miękka / 2007 / 752 str. Termin realizacji zamówienia: ok. 22 dni roboczych.
|
|
cena:
182,26 zł |
Designing Security Architecture Solutions
ISBN: 9780471206026 / Angielski / Miękka / 2002 / 484 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security architecture from a software engineering perspective. He explains why strong security must be a guiding principle of the development process and identifies a common set of features found in most security products, explaining how they can and should impact the... The first guide to tackle security architecture at the software engineering level
Computer security has become a critical business concern, and,... |
|
cena:
359,00 zł |
Database Design and Development: An Essential Guide for It Professionals
ISBN: 9780471218777 / Angielski / Twarda / 2003 / 768 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The first and only database primer for today's global economy
Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary responsibility for the design and maintenance of these databases rests with a company's information technology department. Unlike other IT resources currently available that tend to focus on a particular product, Database Design and Development: An Essential Guide for IT Professionals was... The first and only database primer for today's global economy
Today's businesses depend on their databases to provide information essential for the... |
|
cena:
811,61 zł |
Foundations of Cryptography: Volume 1, Basic Tools
ISBN: 9780521035361 / Angielski / Miękka / 2007 / 396 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...
|
|
cena:
341,37 zł |
Information Systems Development and Data Modeling: Conceptual and Philosophical Foundations
ISBN: 9780521373692 / Angielski / Twarda / 1995 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to present a comparative philosophical study of the various approaches. On the philosophical level, the authors explore the epistemology, ontology, and rationality of each modeling approach. While on the theoretical computer science level, a systematic study of the history and development of three major strands of data modeling is presented. This book will be of great interest to all computer scientists using information systems as well as...
Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to pre...
|
|
cena:
582,90 zł |
Complexity and Cryptography: An Introduction
ISBN: 9780521617710 / Angielski / Miękka / 2006 / 304 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Und...
|
|
cena:
336,19 zł |
Updating Logical Databases
ISBN: 9780521619721 / Angielski / Miękka / 2005 / 224 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the desired change intentionally using a "formula-based" approach to updating needs rather than a "model-based" technique. The complexity of the algorithms, choice of semantics and means of enforcing integrity constraints are also discussed.
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating ne...
|
|
cena:
243,08 zł |
Secure Communicating Systems: Design, Analysis, and Implementation
ISBN: 9780521807319 / Angielski / Twarda / 2001 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A...
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in progra...
|
|
cena:
359,17 zł |
The Geometry of Information Retrieval
ISBN: 9780521838054 / Angielski / Twarda / 2004 / 150 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the general principles of quantum mechanics. All the standard results can be applied to address problems in IR, such as pseudo-relevance feedback, relevance feedback and ostensive retrieval. The relation with quantum computing is examined. Appendices with background material on physics and mathematics are also included.
Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the gener...
|
|
cena:
369,11 zł |
Java and Internet Security
ISBN: 9780595135004 / Angielski / Miękka / 2000 / 208 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
86,72 zł |
Cobb's Guide to PC and LAN Security
ISBN: 9780595181506 / Angielski / Miękka / 2001 / 736 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
182,35 zł |
The Weakest Security Link Series: 1st Edition
ISBN: 9780595264940 / Angielski / Miękka / 2003 / 200 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free...
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understandin...
|
|
cena:
78,03 zł |
The Expert Guide to PeopleSoft Security
ISBN: 9780595324408 / Angielski / Miękka / 2004 / 116 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.
"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge... Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
|
|
cena:
86,72 zł |
Information Security For The Little Guy
ISBN: 9780595386246 / Angielski / Miękka / 2006 / 56 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
|
|
cena:
43,25 zł |
The Expert Guide to PeopleSoft Security
ISBN: 9780595665792 / Angielski / Twarda / 2004 / 116 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.
"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge... Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
|
|
cena:
130,19 zł |
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs
ISBN: 9780596000455 / Angielski / Miękka / 2001 / 788 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet... Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business... |
|
cena:
220,87 zł |