• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2948695]
• Literatura piękna
 [1824038]
• Turystyka
 [70868]
• Informatyka
 [151073]
• Komiksy
 [35227]
• Encyklopedie
 [23181]
• Dziecięca
 [621575]
• Hobby
 [138961]
• AudioBooki
 [1642]
• Literatura faktu
 [228651]
• Muzyka CD
 [371]
• Słowniki
 [2933]
• Inne
 [445341]
• Kalendarze
 [1243]
• Podręczniki
 [164416]
• Poradniki
 [479493]
• Religia
 [510449]
• Czasopisma
 [502]
• Sport
 [61384]
• Sztuka
 [243086]
• CD, DVD, Video
 [3417]
• Technologie
 [219673]
• Zdrowie
 [100865]
• Książkowe Klimaty
 [124]
• Zabawki
 [2168]
• Puzzle, gry
 [3372]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7838]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5001

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Shellcoder's Handbook: Discovering and Exploiting Security Holes Gerardo Richarte 9780470080238 John Wiley & Sons Inc
The Shellcoder's Handbook: Discovering and Exploiting Security Holes

ISBN: 9780470080238 / Angielski / Miękka / 2007 / 752 str.

ISBN: 9780470080238/Angielski/Miękka/2007/752 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Gerardo Richarte
  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
  • New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
  • Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
  • The...
  • This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to...
cena: 170,13

 Database Design and Development: An Essential Guide for It Professionals Ponniah, Paulraj 9780471218777 IEEE Computer Society Press
Database Design and Development: An Essential Guide for It Professionals

ISBN: 9780471218777 / Angielski / Twarda / 2003 / 768 str.

ISBN: 9780471218777/Angielski/Twarda/2003/768 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Paulraj Ponniah
The first and only database primer for today's global economy

Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary responsibility for the design and maintenance of these databases rests with a company's information technology department.

Unlike other IT resources currently available that tend to focus on a particular product, Database Design and Development: An Essential Guide for IT Professionals was...

The first and only database primer for today's global economy

Today's businesses depend on their databases to provide information essential for the...

cena: 757,60

 Foundations of Cryptography: Volume 1, Basic Tools Oded Goldreich 9780521035361 Cambridge University Press
Foundations of Cryptography: Volume 1, Basic Tools

ISBN: 9780521035361 / Angielski / Miękka / 2007 / 396 str.

ISBN: 9780521035361/Angielski/Miękka/2007/396 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Oded Goldreich
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge proofs. Rather than describing ad-hoc approaches, this book emphasizes the clarification of fundamental concepts and the demonstration of the feasibility of solving...
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book prese...
cena: 318,37

 Information Systems Development and Data Modeling: Conceptual and Philosophical Foundations Hirschheim, Rudy 9780521373692 Cambridge University Press
Information Systems Development and Data Modeling: Conceptual and Philosophical Foundations

ISBN: 9780521373692 / Angielski / Twarda / 1995 / 304 str.

ISBN: 9780521373692/Angielski/Twarda/1995/304 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Rudy A. Hirschheim; Heinz K. Klein; Kalle Lyytinen
Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to present a comparative philosophical study of the various approaches. On the philosophical level, the authors explore the epistemology, ontology, and rationality of each modeling approach. While on the theoretical computer science level, a systematic study of the history and development of three major strands of data modeling is presented. This book will be of great interest to all computer scientists using information systems as well as...
Data modeling was hypothesized to be the "salvation" of an organization's data problems. This book aims to analyze the problems encountered and to pre...
cena: 544,53

 Complexity and Cryptography: An Introduction John Talbot (University College London), Dominic Welsh (University of Oxford) 9780521617710 Cambridge University Press
Complexity and Cryptography: An Introduction

ISBN: 9780521617710 / Angielski / Miękka / 2006 / 304 str.

ISBN: 9780521617710/Angielski/Miękka/2006/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John Talbot (University College London);Dominic Welsh (University of Oxford)
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book provides that knowledge, combining an informal style with strong proofs of the key results to provide an accessible introduction. It includes many examples and exercises, and is based on a highly successful course developed and taught over many years.
Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Und...
cena: 350,74

 Updating Logical Databases Marianne Winslett (University of Illinois, Urbana-Champaign) 9780521619721 Cambridge University Press
Updating Logical Databases

ISBN: 9780521619721 / Angielski / Miękka / 2005 / 224 str.

ISBN: 9780521619721/Angielski/Miękka/2005/224 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Urbana-Champaign) Marianne Winslett (University of Illinois
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating new information and getting rid of all outdated information, and yet in the process not disturb any other information in the database? The author has produced a formal method of specifying the desired change intentionally using a "formula-based" approach to updating needs rather than a "model-based" technique. The complexity of the algorithms, choice of semantics and means of enforcing integrity constraints are also discussed.
This book tackles the problems of update algorithms for databases. How can one construct and maintain a database of facts, capable of incorporating ne...
cena: 213,72

 Secure Communicating Systems: Design, Analysis, and Implementation Huth, Michael R. a. 9780521807319 Cambridge University Press
Secure Communicating Systems: Design, Analysis, and Implementation

ISBN: 9780521807319 / Angielski / Twarda / 2001 / 296 str.

ISBN: 9780521807319/Angielski/Twarda/2001/296 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Michael Huth
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical implementation; standard security models for information flow in computer programs or human organizations; and moral, legal, and political issues. Another novel feature is the presentation of a formal model-checking tool for specifying and debugging security protocols. A...
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in progra...
cena: 349,66

 The Geometry of Information Retrieval C. J. Va 9780521838054 Cambridge University Press
The Geometry of Information Retrieval

ISBN: 9780521838054 / Angielski / Twarda / 2004 / 150 str.

ISBN: 9780521838054/Angielski/Twarda/2004/150 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
C. J. Van Rijsbergen
Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the general principles of quantum mechanics. All the standard results can be applied to address problems in IR, such as pseudo-relevance feedback, relevance feedback and ostensive retrieval. The relation with quantum computing is examined. Appendices with background material on physics and mathematics are also included.
Keith Van Rijsbergen demonstrates how different models of information retrieval (IR) can be combined in the same framework used to formulate the gener...
cena: 358,93

 Java and Internet Security Theodore Shrader Bruce Rich Anthony J. Nadalin 9780595135004 iUniverse
Java and Internet Security

ISBN: 9780595135004 / Angielski / Miękka / 2000 / 208 str.

ISBN: 9780595135004/Angielski/Miękka/2000/208 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Theodore Shrader; Bruce Rich; Anthony J. Nadalin
cena: 76,25

 Cobb's Guide to PC and LAN Security Stephen Cobb 9780595181506 Backinprint.com
Cobb's Guide to PC and LAN Security

ISBN: 9780595181506 / Angielski / Miękka / 2001 / 736 str.

ISBN: 9780595181506/Angielski/Miękka/2001/736 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Stephen Cobb
cena: 160,34

 The Weakest Security Link Series: 1st Edition Medina, Luis F. 9780595264940 Writers Club Press
The Weakest Security Link Series: 1st Edition

ISBN: 9780595264940 / Angielski / Miękka / 2003 / 200 str.

ISBN: 9780595264940/Angielski/Miękka/2003/200 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Luis F. Medina
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free...
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understandin...
cena: 68,61

 The Expert Guide to PeopleSoft Security Jason Carter 9780595324408 iUniverse
The Expert Guide to PeopleSoft Security

ISBN: 9780595324408 / Angielski / Miękka / 2004 / 116 str.

ISBN: 9780595324408/Angielski/Miękka/2004/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Carter
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.

"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge...

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
cena: 76,25

 Information Security For The Little Guy Joseph M. Hoffman 9780595386246 iUniverse
Information Security For The Little Guy

ISBN: 9780595386246 / Angielski / Miękka / 2006 / 56 str.

ISBN: 9780595386246/Angielski/Miękka/2006/56 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joseph M. Hoffman
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
Learn to protect your personal data from prying eyes. Classify your data, firewalls, ids, disaster recovery, and other security software devices.
cena: 38,03

 The Expert Guide to PeopleSoft Security Jason Carter 9780595665792 iUniverse
The Expert Guide to PeopleSoft Security

ISBN: 9780595665792 / Angielski / Twarda / 2004 / 116 str.

ISBN: 9780595665792/Angielski/Twarda/2004/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jason Carter
Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anyway? Well, The Expert Guide to PeopleSoft Security is for you.

"The Expert Guide to PeopleSoft Security" provides all the information you need to successfully implement and administer security in PeopleSoft 8. Covering specifics for PeopleTools versions 8.1, 8.2 and 8.4, it is the first book to provide an in-depth look at one of the most important aspects of the PeopleSoft System. "The Expert Guide to PeopleSoft Security" provides knowledge...

Are you new to PeopleSoft? Experienced, but somewhat baffled by PeopleSoft Security? Just wondering what the heck a Primary Permission List does anywa...
cena: 114,47

 Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs Garfinkel, Simson 9780596000455 O'Reilly Media
Web Security, Privacy & Commerce: Security for Users, Administrators and ISPs

ISBN: 9780596000455 / Angielski / Miękka / 2001 / 788 str.

ISBN: 9780596000455/Angielski/Miękka/2001/788 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Simson Garfinkel

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites.Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet...

Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business...

cena: 206,17

 Hardening Cisco Routers Thomas Akin 9780596001667 O'Reilly Media
Hardening Cisco Routers

ISBN: 9780596001667 / Angielski / Miękka / 2002 / 194 str.

ISBN: 9780596001667/Angielski/Miękka/2002/194 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas Akin

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics:

    The importance of router security and where routers fit...

As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement...

cena: 95,36

 Web Performance Tuning Killelea, Patrick 9780596001728 O'Reilly Media
Web Performance Tuning

ISBN: 9780596001728 / Angielski / Miękka / 2002 / 482 str.

ISBN: 9780596001728/Angielski/Miękka/2002/482 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Patrick Killelea

As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features, and consequently longer waits on the Web. Improved performance has become a critical factor in determining the usability of the Web in general and of individual sites in particular.Web Performance Tuning, 2nd Edition is about getting the best possible performance from the Web. This book isn't just about tuning web server software; it's also about streamlining web content, getting optimal performance from a browser, tuning both client and...

As long as there's been a Web, people have been trying to make it faster. The maturation of the Web has meant more users, more data, more features,...

cena: 171,95

 Network Security with Openssl: Cryptography for Secure Communications Viega, John 9780596002701 O'Reilly Media
Network Security with Openssl: Cryptography for Secure Communications

ISBN: 9780596002701 / Angielski / Miękka / 2002 / 386 str.

ISBN: 9780596002701/Angielski/Miękka/2002/386 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John Viega; Matt Messier; Pravir Chandra

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it...

Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats...

cena: 152,69

 Linux Security Cookbook Daniel J. Barrett Richard E. Silverman Robert G. Byrnes 9780596003913 O'Reilly Media
Linux Security Cookbook

ISBN: 9780596003913 / Angielski / Miękka / 2003 / 336 str.

ISBN: 9780596003913/Angielski/Miękka/2003/336 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Daniel J. Barrett; Richard E. Silverman; Robert G. Byrnes

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of...

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one s...

cena: 156,68

 Secure Programming Cookbook for C & C++ John Viega 9780596003944 O'Reilly Media
Secure Programming Cookbook for C & C++

ISBN: 9780596003944 / Angielski / Miękka / 2003 / 792 str.

ISBN: 9780596003944/Angielski/Miękka/2003/792 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
John Viega

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly, today's developers need help figuring out how to write code that attackers won't be able to exploit. But writing such code is surprisingly difficult.

Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code. It contains a wealth of solutions to...

Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks....

cena: 293,81

Podprzednia  1  2  3  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia