• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security Pauline Bowen Joan Hash Mark Wilson 9781475023732 Createspace
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security

ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str.

ISBN: 9781475023732/Angielski/Miękka/2012/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pauline Bowen; Joan Hash; Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
cena: 59,03

 
Under Pressure: Empowering Cyber Security Incident Responders

ISBN: 9798873918362 / Angielski / Miękka / 2024 / 222 str.

ISBN: 9798873918362/Angielski/Miękka/2024/222 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 59,92

 Hackers and Crackers: Cyber-Criminal Have YOU Targeted! Preston, Treat 9781494783808 Createspace
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!

ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str.

ISBN: 9781494783808/Angielski/Miękka/2013/162 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Treat Preston
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
cena: 60,17

 
Complete Guide to SEO for Beginners: A Beginner's Guide to Smart Online Visibility

ISBN: 9798345397695 / Angielski / Miękka / 2024 / 166 str.

ISBN: 9798345397695/Angielski/Miękka/2024/166 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 60,17

 Mastering Your Introduction to Cyber Security Dr Michael C. Redmon 9781634914185 Booklocker.com
Mastering Your Introduction to Cyber Security

ISBN: 9781634914185 / Angielski / Miękka / 2018 / 92 str.

ISBN: 9781634914185/Angielski/Miękka/2018/92 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 60,21

 Air Force Cyberspace Security and Control System (CSCS) U. S. Air Force 9781981808502 Createspace Independent Publishing Platform
Air Force Cyberspace Security and Control System (CSCS)

ISBN: 9781981808502 / Angielski / Miękka / 2017 / 206 str.

ISBN: 9781981808502/Angielski/Miękka/2017/206 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
U. S. Air Force
cena: 60,29

 
Capital of Spies

ISBN: 9798224714117 / Angielski / Miękka / 2024 / 110 str.

ISBN: 9798224714117/Angielski/Miękka/2024/110 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 60,38

 
Code and Connect: Web Programming with PHP and MySQL

ISBN: 9798896107378 / Angielski / Miękka / 2024 / 196 str.

ISBN: 9798896107378/Angielski/Miękka/2024/196 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 60,43

 The CEO's Manual on Cyber Security James Scott 9780989253598 New Renaissance Corporation
The CEO's Manual on Cyber Security

ISBN: 9780989253598 / Angielski / Miękka / 2013 / 244 str.

ISBN: 9780989253598/Angielski/Miękka/2013/244 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social...
Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind....
cena: 60,49

 The Little Black Book of Computer Security, Second Edition MR Joel Dubin 9781475286243 Createspace
The Little Black Book of Computer Security, Second Edition

ISBN: 9781475286243 / Angielski / Miękka / 2012 / 212 str.

ISBN: 9781475286243/Angielski/Miękka/2012/212 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Joel Dubin
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains checklists covering all aspects of computer security from network security, to writing security policies, and application security. It also covers the soft skills of security, such as social engineering and best practices for hiring employees and working with auditors.
This is a reprint of The Little Black Book of Computer Security, Second Edition, which is a comprehensive guide for IT security managers. It contains ...
cena: 60,49

 The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology Scott, James 9780989253529 New Renaissance Corporation
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology

ISBN: 9780989253529 / Angielski / Miękka / 2014 / 130 str.

ISBN: 9780989253529/Angielski/Miękka/2014/130 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
cena: 60,49

 United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment U. S. Army Command and General Staff Col 9781500750244 Createspace
United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment

ISBN: 9781500750244 / Angielski / Miękka / 2014 / 140 str.

ISBN: 9781500750244/Angielski/Miękka/2014/140 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
U. S. Army Command and General Staff Coll
Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive review of recurring and stand-alone strategic cybersecurity strategy and policy documents and a detailed assessment of the United States cyber organization within the Department of Homeland Security, Department of Defense, and Department of Justice, the United States is indeed vulnerable to a cyber attack. Despite the recent emphasis on cyber attacks against private and governmental organizations, the genesis of American interest and awareness of...
Is United States cybersecurity strategy, policy, and organization postured to cope with the post-9/11 security environment? Through an exhaustive revi...
cena: 60,49

 Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action Executive Office of the President 9781502956453 Createspace
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action

ISBN: 9781502956453 / Angielski / Miękka / 2014 / 30 str.

ISBN: 9781502956453/Angielski/Miękka/2014/30 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Executive Office of the President
This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated. This study explores a future - a "healthy cyber ecosystem" -...
This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U...
cena: 60,49

 Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring Air Force Research Laboratory 9781500253370 Createspace
Ensuring Survivable Information Services: Architecting, Diagnosing and Reconfiguring

ISBN: 9781500253370 / Angielski / Miękka / 2014 / 34 str.

ISBN: 9781500253370/Angielski/Miękka/2014/34 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Air Force Research Laboratory
cena: 60,49

 When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia Air Command and Staff College 9781500253608 Createspace
When is a Hack an Attack? A Sovereign State's Options if Attacked in Cyberspace: A Case Study of Estonia

ISBN: 9781500253608 / Angielski / Miękka / 2014 / 34 str.

ISBN: 9781500253608/Angielski/Miękka/2014/34 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Air Command and Staff College
cena: 60,49

 The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology Scott, James 9781514331361 Createspace
The Book on Healthcare IT Volume 2: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology

ISBN: 9781514331361 / Angielski / Miękka / 2015 / 168 str.

ISBN: 9781514331361/Angielski/Miękka/2015/168 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings you a complete and up-to-date overview of the key issues related to the adoption and use of information technology, communications and healthcare, with detailed practical information to support students, professionals and other stakeholders in the field of healthcare. Health Informatics, an evolving specialization, strives to improve the quality and safety of patient care. This book addresses the concepts, tasks and skills that professionals...
The Book on Healthcare IT: What you need to know about Health Informatics, Hospital IT, EHR, HIE and Healthcare Information Technology Volume 2 brings...
cena: 60,49

 Handling Electronically Stored Information (ESI) in the Era of the Cloud Yardeni, Guy 9781514804346 Createspace
Handling Electronically Stored Information (ESI) in the Era of the Cloud

ISBN: 9781514804346 / Angielski / Miękka / 2015 / 92 str.

ISBN: 9781514804346/Angielski/Miękka/2015/92 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Chris Amaris; Guy Yardeni; Rand Morimoto
More commonly known as emails, files, attachments, and documents, Electronically Stored Information (ESI) and the policy management around ESI has drastically changed over the past few years. Not only have laws and regulations taken on better definition on how ESI should be handled, but the proliferation of use of mobile devices and the integration of cloud storage like Box, DropBox, OneDrive and the like impacts how enterprises need to manage their critical digital information. However technology has moved far faster than what organizations have adopted as their ESI policies, and those...
More commonly known as emails, files, attachments, and documents, Electronically Stored Information (ESI) and the policy management around ESI has dra...
cena: 60,49

 Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector - Volume 4 Scott, James 9781519254597 Createspace
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector - Volume 4

ISBN: 9781519254597 / Angielski / Miękka / 2015 / 116 str.

ISBN: 9781519254597/Angielski/Miękka/2015/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming rate. With each breach there are empty promises and finger pointing while the organizations attempt to attribute the hack to a bad actor like Deep Panda based off of exploit kit components that were used in a previous breach. Where are they getting their information? Who knows and who cares because it's almost always wrong and attribution is typically a waste of time as it is an attempt to take the responsibility and public outrage off of the...
In recent years the volume of hospitals and the health sector entities that that have fallen victim to hackers has continued to rise at an alarming ra...
cena: 60,49

 Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3 Scott, James 9781519234742 Createspace
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 3

ISBN: 9781519234742 / Angielski / Miękka / 2015 / 106 str.

ISBN: 9781519234742/Angielski/Miękka/2015/106 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both state sponsored and mercenary have been effortlessly pummeling our health sector networks while organizations do little to stop them. A firewall and anti-virus software will do little to stop intruders yet little, if anything, is being done to create standards to thwart a breach. Cybersecurity-centric components must be included in the curriculum of anyone studying health IT, HIPAA and healthcare informatics as these are the first victims that will...
As a crucial component of our Nation's critical infrastructure, the health sector is an obvious and wide open target for bad actors. Hackers, both sta...
cena: 60,49

 Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1 Scott, James 9781519161505 Createspace
Cybersecurity Hygiene for the Healthcare Industry: The basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector Volume 1

ISBN: 9781519161505 / Angielski / Miękka / 2015 / 116 str.

ISBN: 9781519161505/Angielski/Miękka/2015/116 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James Scott
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated. Bad actors come in all forms with a multitude of methods, motivations and exploits but virtually all of them start...
Hospitals and the healthcare community as a whole have become the most common and lucrative target for cyber-attack. Many breaches are targeted and so...
cena: 60,49

Podprzednia  31  32  33  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia