• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Web Application Security Sullivan, Bryan 9780071776165 0
Web Application Security

ISBN: 9780071776165 / Angielski / Miękka / 2011 / 352 str.

ISBN: 9780071776165/Angielski/Miękka/2011/352 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bryan Sullivan
Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting out." --Ryan McGeehan, Security Manager, Facebook, Inc.

Secure web applications from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious...

Security Smarts for the Self-Guided IT Professional

"Get to know the hackers--or plan on getting hacked. Sullivan and Liu have created a savvy, ess...

cena: 200,38

 Hacking Exposed 7 George Kurtz 9780071780285 McGraw-Hill Education - Europe
Hacking Exposed 7

ISBN: 9780071780285 / Angielski / Miękka / 2012 / 768 str.

ISBN: 9780071780285/Angielski/Miękka/2012/768 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
George Kurtz

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment

"Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the...

The latest tactics for thwarting digital attacks

"Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, s...

cena: 235,06

 The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk McCarthy, N. K. 9780071790390 0
The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk

ISBN: 9780071790390 / Angielski / Miękka / 2012 / 240 str.

ISBN: 9780071790390/Angielski/Miękka/2012/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
N K McCarthy

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in this tactical guide. The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk shows you how to build and manage successful response plans for the cyber incidents that have become inevitable for organizations of any size. Find out why these plans work. Learn the step-by-step process for developing and managing plans built to address the wide range of issues organizations face in times of crisis....

Uncertainty and risk, meet planning and action.

Reinforce your organization's security posture using the expert information contained in ...

cena: 281,31

 Malware, Rootkits & Botnets Elisan, Christopher 9780071792066 0
Malware, Rootkits & Botnets

ISBN: 9780071792066 / Angielski / Miękka / 2012 / 432 str.

ISBN: 9780071792066/Angielski/Miękka/2012/432 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Christopher Elisan
Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practices for thwarting them.

After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for...

Security Smarts for the Self-Guided IT Professional

Learn how to improve the security posture of your organization and defend against some of the m...

cena: 200,38

 Cryptography: Infosec Pro Guide Oriyano, Sean-Philip 9780071794251 0
Cryptography: Infosec Pro Guide

ISBN: 9780071794251 / Angielski / Miękka / 2013 / 320 str.

ISBN: 9780071794251/Angielski/Miękka/2013/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sean Philip Oriyano
Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers...

Security Smarts for the Self-Guided IT Professional

This complete, practical resource for security and IT professionals presents the underpinnings ...

cena: 154,14

 Network Security a Beginner's Guide, Third Edition Maiwald, Eric 9780071795708 0
Network Security a Beginner's Guide, Third Edition

ISBN: 9780071795708 / Angielski / Miękka / 2012 / 336 str.

ISBN: 9780071795708/Angielski/Miękka/2012/336 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Maiwald
Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies.

You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption...

Security Smarts for the Self-Guided IT Professional

Defend your network against a wide range of existing and emerging threats. Written by a Certifi...

cena: 188,82

 Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition Collier, Mark 9780071798761 0
Hacking Exposed Unified Communications & Voip Security Secrets & Solutions, Second Edition

ISBN: 9780071798761 / Angielski / Miękka / 2013 / 560 str.

ISBN: 9780071798761/Angielski/Miękka/2013/560 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Collier
The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up...

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. Th...

cena: 235,06

 Oracle Database 12c Install, Configure & Maintain Like a Professional Ian Abramson 9780071799331 0
Oracle Database 12c Install, Configure & Maintain Like a Professional

ISBN: 9780071799331 / Angielski / Miękka / 2013 / 472 str.

ISBN: 9780071799331/Angielski/Miękka/2013/472 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ian Abramson
Master the Fundamentals of Oracle Database 12c

Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core database concepts, the role of the administrator, and enterprise database capabilities. Oracle Database 12c: Install, Configure & Maintain Like a Professional walks you through database configuration, administration, programming, backup and recovery, and high availability. You'll get in-depth introductions to SQL and PL/SQL as well as important information on managing large databases and using Oracle's engineered systems. This essential...

Master the Fundamentals of Oracle Database 12c

Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core dat...

cena: 134,87

 Anti-Hacker Tool Kit, Fourth Edition Mike Shema 9780071800143 0
Anti-Hacker Tool Kit, Fourth Edition

ISBN: 9780071800143 / Angielski / Miękka / 2014 / 624 str.

ISBN: 9780071800143/Angielski/Miękka/2014/624 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Shema
Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit,...

cena: 211,94

 Hacking Exposed Mobile: Security Secrets & Solutions Bergman, Neil 9780071817011 0
Hacking Exposed Mobile: Security Secrets & Solutions

ISBN: 9780071817011 / Angielski / Miękka / 2013 / 320 str.

ISBN: 9780071817011/Angielski/Miękka/2013/320 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Joel Scambray
Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior...

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The autho...

cena: 235,06

 Computer Security: 20 Things Every Employee Should Know Ben Rothke 9780072262827 0
Computer Security: 20 Things Every Employee Should Know

ISBN: 9780072262827 / Angielski / Miękka / 2005 / 64 str.

ISBN: 9780072262827/Angielski/Miękka/2005/64 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ben Rothke
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to keep corporate data and systems secure. This guide includes Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; and E-mail.
Presents the risks, responsibilities, and liabilities (known and unknown) of which employees should be aware, as well as simple protective steps to ke...
cena: 92,62

 The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice Winterfeld, Steve 9780124047372 0
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

ISBN: 9780124047372 / Angielski / Miękka / 2012 / 150 str.

ISBN: 9780124047372/Angielski/Miękka/2012/150 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Steve Winterfeld

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks...

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book ex...

cena: 117,50

 Fisma Compliance Handbook: Second Edition Laura Taylor 9780124058712 0
Fisma Compliance Handbook: Second Edition

ISBN: 9780124058712 / Angielski / Miękka / 2013 / 350 str.

ISBN: 9780124058712/Angielski/Miękka/2013/350 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Laura Taylor

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a...

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition ...

cena: 269,33

 Introduction to Cyber-Warfare: A Multidisciplinary Approach Shakarian, Paulo 9780124078147 0
Introduction to Cyber-Warfare: A Multidisciplinary Approach

ISBN: 9780124078147 / Angielski / Miękka / 2013 / 318 str.

ISBN: 9780124078147/Angielski/Miękka/2013/318 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Paulo Shakarian
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

  • Provides a multi-disciplinary approach to...
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world ...
cena: 181,17

 Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095045 Syngress Media,U.S.
Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

ISBN: 9780124095045 / Angielski / Miękka / 2012 / 32 str.

ISBN: 9780124095045/Angielski/Miękka/2012/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they...

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.

cena: 113,93

 Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095052 Syngress Media,U.S.
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095052 / Angielski / Miękka / 2012 / 48 str.

ISBN: 9780124095052/Angielski/Miękka/2012/48 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find...

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Key...

cena: 113,93

 Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard Brett Shavers (Digital Forensics Practitioner, expert witness, and Adjunct Instructor, University of Washington Digital  9780124095069 Syngress Media,U.S.
Cybercrime Investigative Case Management: An Excerpt from Placing the Suspect Behind the Keyboard

ISBN: 9780124095069 / Angielski / Miękka / 2012 / 28 str.

ISBN: 9780124095069/Angielski/Miękka/2012/28 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
expert witnes Brett Shavers (Digital Forensics Practitioner

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate...

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard....

cena: 113,93

 Crisis Management at the Speed of the Internet: Trend Report Bob Hayes (Managing Director, Security Executive Council; former CSO, Georgia-Pacific), Kathleen Kotwica (Executive vice 9780124115873 Elsevier Science Publishing Co Inc
Crisis Management at the Speed of the Internet: Trend Report

ISBN: 9780124115873 / Angielski / Miękka / 2013 / 36 str.

ISBN: 9780124115873/Angielski/Miękka/2013/36 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Security Executive Council; fo Bob Hayes (Managing Director;Kathleen Kotwica (Executive vice president and chief knowled

Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster--even if the viral information isn't factual. It is critical that an organization respond quickly and decisively to crises in online media.

The report explores examples of companies that have experienced this kind of impact, and describes practical,...

Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful im...

cena: 78,32

 Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Andress, Jason 9780124166721 0
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

ISBN: 9780124166721 / Angielski / Miękka / 2013 / 306 str.

ISBN: 9780124166721/Angielski/Miękka/2013/306 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jason Andress

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to...

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, batt...

cena: 146,88

 Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy Philip Alexander 9780313360077 0
Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy

ISBN: 9780313360077 / Angielski / Twarda / 2009 / 160 str.

ISBN: 9780313360077/Angielski/Twarda/2009/160 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Philip Alexander

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and...

In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and networ...

cena: 283,55

Podprzednia  31  32  33  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia