• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone Cambridge, Rodney D. 9781475097009 Createspace
How NOT To Use Your Smartphone: Avoid hackers stealing your identity via your phone

ISBN: 9781475097009 / Angielski / Miękka / 2012 / 90 str.

ISBN: 9781475097009/Angielski/Miękka/2012/90 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rodney D. Cambridge
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hackers and bad guys are everywhere. They're after your data so they can steal from you and make you a victim of ID theft, credit card fraud, utilities fraud, or worse. But not only can they do this through your PC or laptop, now they can do it all through your iPhone, Android, or Blackberry. Don't let them Many ID theft attempts occur when you're away from home and in unfamiliar surroundings. So when you're visiting that coffee shop with friends,...
If you're new to the world of smartphones and tablets, you might not have given a second thought about how to use your shiny new device safely. Hacker...
cena: 32,33

 The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend Dan Griffin 9781475232707 Createspace
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend

ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str.

ISBN: 9781475232707/Angielski/Miękka/2013/126 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dan Griffin
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
cena: 80,88

 Darknet Ecosystems: Surfacing Underground Economies Michael J. Pritchard 9781484077016 Createspace
Darknet Ecosystems: Surfacing Underground Economies

ISBN: 9781484077016 / Angielski / Miękka / 2013 / 184 str.

ISBN: 9781484077016/Angielski/Miękka/2013/184 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael J. Pritchard
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. The ability to monitor, track and secure information may be organically increased through the perception that group members are getting something "free" out of the exchange of information. This may likely suggest that underground economies could be influenced, when the concept of "free" lowers the perceived market value of "anonymity." This in turn has the effect of surfacing underground economic activity. Evidence may likely suggest that an...
The utilization of anonymous communication models, while troublesome for security practitioners, present unique information tracking opportunities. Th...
cena: 149,51

 Cloud Security and Control Dan Griffin 9781469992549 Createspace
Cloud Security and Control

ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str.

ISBN: 9781469992549/Angielski/Miękka/2012/82 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dan Griffin
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
cena: 80,88

 Privacy: Select Issues & Laws for the 21st Century Doris B Delrio 9781626184299 Nova Science Publishers Inc
Privacy: Select Issues & Laws for the 21st Century

ISBN: 9781626184299 / Angielski / Twarda / 2013 / 207 str.

ISBN: 9781626184299/Angielski/Twarda/2013/207 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Doris B Delrio
cena: 1346,82

 Threat Modeling: Designing for Security Adam Shostack 9781118809990 John Wiley & Sons Inc
Threat Modeling: Designing for Security

ISBN: 9781118809990 / Angielski / Miękka / 2014 / 624 str.

ISBN: 9781118809990/Angielski/Miękka/2014/624 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Adam Shostack

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches,...

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptograph...

cena: 262,93

 Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Gomzin, Slava 9781118810118 John Wiley & Sons Inc
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

ISBN: 9781118810118 / Angielski / Miękka / 2014 / 312 str.

ISBN: 9781118810118/Angielski/Miękka/2014/312 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Slava Gomzin

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with...

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neim...

cena: 244,89

 Network Security, Firewalls and VPNs Stewart, J. Michael 9781284031676 Jones & Bartlett Publishers
Network Security, Firewalls and VPNs

ISBN: 9781284031676 / Angielski / Miękka / 2013 / 490 str.

ISBN: 9781284031676/Angielski/Miękka/2013/490 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
J. Michael Stewart
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Field, Network Security, Firewalls, And Vpns, Second Edition Provides A Unique, In-Depth Look At The Major Business Challenges And Threats That Are Introduced When An Organization'S Network Is Connected To The Public Internet. Written By An Industry Expert, This Book Provides A Comprehensive Explanation Of Network Security Basics, Including How Hackers Access Online Networks And The Use Of Firewalls And Vpns To Provide Security Countermeasures....
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully Revised And Updated With The Latest Data From The Fiel...
cena: 406,51

 Hacker Techniques, Tools, and Incident Handling Sean-Philip Oriyano 9781284031713 Jones & Bartlett Publishers
Hacker Techniques, Tools, and Incident Handling

ISBN: 9781284031713 / Angielski / Miękka / 2013 / 500 str.

ISBN: 9781284031713/Angielski/Miękka/2013/500 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Sean-Philip Oriyano
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Needs To Know About Hackers And Computer Criminals Who Break Into Networks, Steal Information, And Corrupt Data. It Goes On To Review The Technical Overview Of Hacking: How Attacks Target Networks And The Methodology They Follow. The Final Section Studies Those Methods That Are Most Effective When Dealing With Hacking Attacks, Especially In An Age Of Increased Reliance On The Web. Written By A Subject Matter Expert With Numerous Real-World Examples,...
Hacker Techniques, Tools, And Incident Handling Begins With An Examination Of The Landscape, Key Terms, And Concepts That A Security Professional Need...
cena: 386,93

 Android Application Security Essentials Pragati Rai 9781849515603 COMPUTER BOOKSHOPS
Android Application Security Essentials

ISBN: 9781849515603 / Angielski / Miękka / 2013 / 218 str.

ISBN: 9781849515603/Angielski/Miękka/2013/218 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pragati Rai
cena: 211,44

 Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition Joel Scambray 9780071494267 0
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition

ISBN: 9780071494267 / Angielski / Miękka / 2007 / 451 str.

ISBN: 9780071494267/Angielski/Miękka/2007/451 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scambray

The latest Windows security attack and defense strategies

"Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and...

The latest Windows security attack and defense strategies

"Securing Windows begins with reading this book." --James Costello...

cena: 262,04

 Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line Velte, Toby 9780071599238 0
Green It: Reduce Your Information System's Environmental Impact While Adding to the Bottom Line

ISBN: 9780071599238 / Angielski / Miękka / 2008 / 308 str.

ISBN: 9780071599238/Angielski/Miękka/2008/308 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Toby Velte

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap for integrating environmentally sound techniques and technologies into your Information Systems architecture. Green IT explains how to adopt a business-driven green initiative and provides a detailed implementation plan. You will find strategies for reducing power needs, procuring energy from alternative sources, utilizing virtualization technologies, and managing sustainable development. Case studies highlighting successful green IT...

Reduce the environmental and budgetary impact of your IT infrastructure

This groundbreaking work offers a complete roadmap f...

cena: 154,14

 Mobile Application Security Himanshu Dwivedi 9780071633567 0
Mobile Application Security

ISBN: 9780071633567 / Angielski / Miękka / 2010 / 432 str.

ISBN: 9780071633567/Angielski/Miękka/2010/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Himanshu Dwivedi
Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this...

Secure today's mobile devices and applications

Implement a systematic approach to security in your mobile application development with help from th...

cena: 235,06

 Security Information and Event Management (SIEM) Implementation David Miller 9780071701099 0
Security Information and Event Management (SIEM) Implementation

ISBN: 9780071701099 / Angielski / Miękka / 2010 / 464 str.

ISBN: 9780071701099/Angielski/Miękka/2010/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Miller

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this authoritative guide. Written by IT security experts, Security Information and Event Management (SIEM) Implementation shows you how to deploy SIEM technologies to monitor, identify, document, and respond to security threats and reduce false-positive alerts. The book explains how to implement SIEM products from different vendors, and discusses the strengths, weaknesses, and advanced tuning of these systems. You'll also learn how to use SIEM...

Implement a robust SIEM system

Effectively manage the security information and events produced by your network with help from this author...

cena: 323,69

 Hacking Exposed Web Applications, Third Edition Joel Scrambay 9780071740647 McGraw-Hill Osborne
Hacking Exposed Web Applications, Third Edition

ISBN: 9780071740647 / Angielski / Miękka / 2010 / 482 str.

ISBN: 9780071740647/Angielski/Miękka/2010/482 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scrambay
The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development...

The latest Web app attacks and countermeasures from world-renowned practitioners

Protect your Web applications from malicious attacks by mastering ...

cena: 250,48

 Designing an IAM Framework with Oracle Identity and Access Management Suite Jeff Scheidel 9780071741378 0
Designing an IAM Framework with Oracle Identity and Access Management Suite

ISBN: 9780071741378 / Angielski / Miękka / 2010 / 368 str.

ISBN: 9780071741378/Angielski/Miękka/2010/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jeff Scheidel
Develop and Implement an End-to-End IAM Solution

Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business...

Develop and Implement an End-to-End IAM Solution

Maintain a high-performance, fully integrated security foundation across your enterprise using the...

cena: 211,94

 Computer Forensics InfoSec Pro Guide David Cowen 9780071742450 0
Computer Forensics InfoSec Pro Guide

ISBN: 9780071742450 / Angielski / Miękka / 2013 / 344 str.

ISBN: 9780071742450/Angielski/Miękka/2013/344 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Cowen
Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to transition from an IT professional to a computer forensic examiner in the private sector. Written by a Certified Information Systems Security Professional, Computer Forensics: InfoSec Pro Guide is filled with real-world case studies that demonstrate the concepts covered in the book.

You'll learn how to set up a forensics lab, select hardware and software, choose forensic imaging procedures, test your tools, capture evidence from...

Security Smarts for the Self-Guided IT Professional

Find out how to excel in the field of computer forensics investigations. Learn what it takes to...

cena: 169,55

 Wireless Network Security a Beginner's Guide Wrightson, Tyler 9780071760942 0
Wireless Network Security a Beginner's Guide

ISBN: 9780071760942 / Angielski / Miękka / 2012 / 368 str.

ISBN: 9780071760942/Angielski/Miękka/2012/368 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tyler Wrightson
Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.

This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks,...

Security Smarts for the Self-Guided IT Professional

Protect wireless networks against all real-world hacks by learning how hackers operate. Wire...

cena: 161,85

 Reverse Deception: Organized Cyber Threat Counter-Exploitation Sean Bodmer 9780071772495 0
Reverse Deception: Organized Cyber Threat Counter-Exploitation

ISBN: 9780071772495 / Angielski / Miękka / 2012 / 464 str.

ISBN: 9780071772495/Angielski/Miękka/2012/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Bodmer

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in the field."--Slashdot

Expose, pursue, and prosecute the perpetrators of advanced persistent threats (APTs) using the tested security techniques and real-world case studies featured in this one-of-a-kind guide. Reverse Deception: Organized Cyber Threat Counter-Exploitation shows how to assess your network's vulnerabilities, zero in on targets, and effectively block intruders. Discover how to set up digital traps, misdirect and...

In-depth counterintelligence tactics to fight cyber-espionage

"A comprehensive and unparalleled overview of the topic by experts in t...

cena: 200,38

 Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap Witte, Greg 9780071772518 0
Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with Scap

ISBN: 9780071772518 / Angielski / Miękka / 2012 / 288 str.

ISBN: 9780071772518/Angielski/Miękka/2012/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Greg Witte

Master the latest digital security automation technologies

Achieve a unified view of security across your IT infrastructure using the cutting-edge techniques contained in this authoritative volume. Security Automation Essentials: Streamlined Enterprise Security Management & Monitoring with SCAP lays out comprehensive technical, administrative, and operational strategies for security management. Discover how to define baseline requirements, automatically confirm patches and updates, identify vulnerabilities, write customized auditing content, and evaluate compliance across...

Master the latest digital security automation technologies

Achieve a unified view of security across your IT infrastructure using the cut...

cena: 281,31

Podprzednia  28  29  30  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia