
ilość książek w kategorii: 5020
![]() |
Crime Prevention: Theory and Practice, Second Edition
ISBN: 9781466577114 / Angielski / Twarda / 2014 / 532 str. Termin realizacji zamówienia: ok. 22 dni roboczych. In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest research, the most recently published articles and books, and feedback from professors and students using the first edition. Providing an introduction to dominant approaches, key concepts, theories, and research, the book supplies concrete advice on planning, implementing, and evaluating a crime prevention plan. This edition includes a new chapter applying crime prevention through social development principles to adolescents and... In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest res... |
cena:
881,59 |
![]() |
Trends in Corrections: Interviews with Corrections Leaders Around the World, Volume Two
ISBN: 9781466591561 / Angielski / Twarda / 2014 / 310 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the... The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great d... |
cena:
857,10 |
![]() |
Architectures and Protocols for Secure Information Technology Infrastructures
ISBN: 9781466645141 / Angielski / Twarda / 2013 / 427 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making th...
|
cena:
999,40 |
![]() |
Cloud Computing and Virtualization Technologies in Libraries
ISBN: 9781466646315 / Angielski / Twarda / 2013 / 385 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book...
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of te...
|
cena:
896,90 |
![]() |
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications
ISBN: 9781466646919 / Angielski / Twarda / 2013 / 577 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current... While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
|
cena:
999,40 |
![]() |
Network Security Technologies: Design and Applications
ISBN: 9781466647893 / Angielski / Twarda / 2013 / 330 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologie...
|
cena:
999,40 |
![]() |
Analyzing Security, Trust, and Crime in the Digital World
ISBN: 9781466648562 / Angielski / Twarda / 2013 / 281 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizatio...
|
cena:
999,40 |
![]() |
Conducting Network Penetration and Espionage in a Global Environment
ISBN: 9781482206470 / Angielski / Twarda / 2014 / 599 str. Termin realizacji zamówienia: ok. 22 dni roboczych. When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Condu... |
cena:
514,26 |
![]() |
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition
ISBN: 9781482230116 / Angielski / Twarda / 2014 / 241 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes what groups in the network are doing to recruit, plan, and carry out attacks worldwide. Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, cover... |
cena:
342,79 |
![]() |
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)
ISBN: 9781483963167 / Angielski / Miękka / 2013 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
44,47 |
![]() |
Instant Ossec Host-Based Intrusion Detection System
ISBN: 9781782167648 / Angielski / Miękka / 2013 / 62 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
129,43 |
![]() |
Vmware View Security Essentials
ISBN: 9781782170082 / Angielski / Miękka / 2013 / 130 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered security Secure all your connections between client and desktop
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered ...
|
cena:
189,86 |
![]() |
Information Security Management: Global Challenges in the New Millennium
ISBN: 9781878289780 / Angielski / Miękka / 2012 / 196 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This volume offers a compilation of the work of researchers and practitioners addressing issues, trends and challenges facing the management of information security in the third millennium. The book focuses on aspects of information security planning, evaluation, design and implementation.
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This vol...
|
cena:
358,50 |
![]() |
Hacking Exposed Computer Forensics
ISBN: 9780071832502 / Angielski / Twarda / 2009 / 546 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
304,43 |
![]() |
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics
ISBN: 9781466563032 / Angielski / Twarda / 2014 / 334 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies. Injury or loss of life can best be avoided if agencies have accurate knowledge and proper training in less lethal options. Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics discusses how lessons learned from major disturbances have helped law enforcement professionals develop concepts and techniques that police departments can apply to increase successful outcomes, manage risk, and limit liability.... Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies.... |
cena:
514,26 |
![]() |
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets
ISBN: 9781490369396 / Angielski / Miękka / 2013 / 172 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,43 |
![]() |
FAA Computer Security: Recommenations to Address Continuing Weaknesses
ISBN: 9781493627431 / Angielski / Miękka / 2000 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
60,65 |
![]() |
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud
ISBN: 9780769549781 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
76,88 |
![]() |
Getting Started with Fortigate
ISBN: 9781782178200 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
|
cena:
142,38 |
![]() |
Introduction to Information Security and ISO 27001: 2013
ISBN: 9781849285261 / Angielski / Miękka / 2013 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project....
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An ...
|
cena:
76,84 |