• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Crime Prevention: Theory and Practice, Second Edition Stephen Schneider 9781466577114 CRC Press
Crime Prevention: Theory and Practice, Second Edition

ISBN: 9781466577114 / Angielski / Twarda / 2014 / 532 str.

ISBN: 9781466577114/Angielski/Twarda/2014/532 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Stephen Schneider

In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest research, the most recently published articles and books, and feedback from professors and students using the first edition. Providing an introduction to dominant approaches, key concepts, theories, and research, the book supplies concrete advice on planning, implementing, and evaluating a crime prevention plan.

This edition includes a new chapter applying crime prevention through social development principles to adolescents and...

In Crime Prevention: Theory and Practice, Second Edition, Dr. Schneider has updated every chapter in this reliable text using the latest res...

cena: 881,59

 Trends in Corrections: Interviews with Corrections Leaders Around the World, Volume Two Hurley, Martha Henderson 9781466591561 CRC Press
Trends in Corrections: Interviews with Corrections Leaders Around the World, Volume Two

ISBN: 9781466591561 / Angielski / Twarda / 2014 / 310 str.

ISBN: 9781466591561/Angielski/Twarda/2014/310 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Martha Henderson Hurley; Dilip K. Das

The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the...

The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great d...

cena: 857,10

 Architectures and Protocols for Secure Information Technology Infrastructures Ruiz-Martinez 9781466645141 Information Science Reference
Architectures and Protocols for Secure Information Technology Infrastructures

ISBN: 9781466645141 / Angielski / Twarda / 2013 / 427 str.

ISBN: 9781466645141/Angielski/Twarda/2013/427 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ruiz-Martinez
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...
With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making th...
cena: 999,40

 Cloud Computing and Virtualization Technologies in Libraries Dhanadhere 9781466646315 Information Science Reference
Cloud Computing and Virtualization Technologies in Libraries

ISBN: 9781466646315 / Angielski / Twarda / 2013 / 385 str.

ISBN: 9781466646315/Angielski/Twarda/2013/385 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dhanadhere
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of technologies utilized, cloud computing and virtual technology has become an advantage for libraries to provide a single efficient system that saves money and time. Cloud Computing and Virtualization Technologies in Libraries highlights the concerns and limitations that need addressed in order to optimize the benefits of cloud computing to the virtualization of libraries. Focusing on the latest innovations and technological advancements, this book...
The emergence of open access, web technology, and e-publishing has slowly transformed modern libraries into digital libraries. With this variety of te...
cena: 896,90

 Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications Rawat                                    Danda B. Rawat Bhed B. Bista 9781466646919 Information Science Reference
Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

ISBN: 9781466646919 / Angielski / Twarda / 2013 / 577 str.

ISBN: 9781466646919/Angielski/Twarda/2013/577 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rawat; Danda B. Rawat; Bhed B. Bista
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these networks expect a high level of security and privacy to ensure the integrity and confidentiality of communications among terminals, networks, applications, and services

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications examines the current scope of theoretical and practical applications on the security of mobile and wireless communications. This book covers fundamental concepts of current...
While security is of vital importance to ensure the integrity of communications in wireless and mobile networks, most businesses which rely on these n...
cena: 999,40

 Network Security Technologies: Design and Applications Abdelmalek Amine 9781466647893 Information Science Reference
Network Security Technologies: Design and Applications

ISBN: 9781466647893 / Angielski / Twarda / 2013 / 330 str.

ISBN: 9781466647893/Angielski/Twarda/2013/330 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Abdelmalek Amine
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested...
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologie...
cena: 999,40

 Analyzing Security, Trust, and Crime in the Digital World Hamid R. Nemati 9781466648562 Information Science Reference
Analyzing Security, Trust, and Crime in the Digital World

ISBN: 9781466648562 / Angielski / Twarda / 2013 / 281 str.

ISBN: 9781466648562/Angielski/Twarda/2013/281 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Hamid R. Nemati
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.
In the digital era, information is the most valuable resource, and protecting one's assets is a constant struggle for both individuals and organizatio...
cena: 999,40

 Conducting Network Penetration and Espionage in a Global Environment Bruce Middleton 9781482206470 Auerbach Publications
Conducting Network Penetration and Espionage in a Global Environment

ISBN: 9781482206470 / Angielski / Twarda / 2014 / 599 str.

ISBN: 9781482206470/Angielski/Twarda/2014/599 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Bruce Middleton

When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.
The book taps into Bruce Middleton s decades...

When it s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Condu...

cena: 514,26

 Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition Ang, Dennis 9781482230116 CRC Press
Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition

ISBN: 9781482230116 / Angielski / Twarda / 2014 / 241 str.

ISBN: 9781482230116/Angielski/Twarda/2014/241 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Elena Mastors

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, covers recent developments, and explains how, why, and where the al-Qaeda network is expanding. The author examines the current state of the terrorist network and describes what groups in the network are doing to recruit, plan, and carry out attacks worldwide.
The book reports on intelligence and counterterror methods being used to garner information on al-Qaeda. It describes how the destabilization of Arab countries has led to opportunities for...

Breaking Al-Qaeda: Psychological and Operational Techniques, Second Edition explores the background and history of al-Qaeda, cover...

cena: 342,79

 Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives) Willburn, Michael 9781483963167 Createspace
Dissecting the Ethical Hacker: A guide for the Wine'n Cheese Crowd (a.k.a. Suits & Technology Executives)

ISBN: 9781483963167 / Angielski / Miękka / 2013 / 130 str.

ISBN: 9781483963167/Angielski/Miękka/2013/130 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Willburn
cena: 44,47

 Instant Ossec Host-Based Intrusion Detection System Lhotsky, Brad 9781782167648 Packt Publishing
Instant Ossec Host-Based Intrusion Detection System

ISBN: 9781782167648 / Angielski / Miękka / 2013 / 62 str.

ISBN: 9781782167648/Angielski/Miękka/2013/62 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Brad Lhotsky
cena: 129,43

 Vmware View Security Essentials Langenhan, Daniel 9781782170082 Packt Publishing
Vmware View Security Essentials

ISBN: 9781782170082 / Angielski / Miękka / 2013 / 130 str.

ISBN: 9781782170082/Angielski/Miękka/2013/130 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Daniel Langenhan
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered security Secure all your connections between client and desktop
Discover how to correctly implement View connection, security, and transfer servers Understand all the firewall rules and the basics of multi-layered ...
cena: 189,86

 Information Security Management: Global Challenges in the New Millennium Dhillon, Gurpreet S. 9781878289780 Idea Group Publishing
Information Security Management: Global Challenges in the New Millennium

ISBN: 9781878289780 / Angielski / Miękka / 2012 / 196 str.

ISBN: 9781878289780/Angielski/Miękka/2012/196 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gurpreet S. Dhillon; Gurpreet Dhillon
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This volume offers a compilation of the work of researchers and practitioners addressing issues, trends and challenges facing the management of information security in the third millennium. The book focuses on aspects of information security planning, evaluation, design and implementation.
Information security is moving much higher up the agenda of corporate concerns. The potential pitfalls of corporate information are enormous. This vol...
cena: 358,50

 Hacking Exposed Computer Forensics Philipp 9780071832502 McGraw-Hill
Hacking Exposed Computer Forensics

ISBN: 9780071832502 / Angielski / Twarda / 2009 / 546 str.

ISBN: 9780071832502/Angielski/Twarda/2009/546 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Philipp
cena: 304,43

 Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics Wyant, R. T. 9781466563032 CRC Press
Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics

ISBN: 9781466563032 / Angielski / Twarda / 2014 / 334 str.

ISBN: 9781466563032/Angielski/Twarda/2014/334 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Rick T. Wyant; Thomas Burns

Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies. Injury or loss of life can best be avoided if agencies have accurate knowledge and proper training in less lethal options. Risk Management of Less Lethal Options: Evaluation, Deployment, Aftermath, and Forensics discusses how lessons learned from major disturbances have helped law enforcement professionals develop concepts and techniques that police departments can apply to increase successful outcomes, manage risk, and limit liability....

Force used to quell out-of-control demonstrations or detain unruly individuals can result in litigation and bad press for law enforcement agencies....

cena: 514,26

 You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets William Webb 9781490369396 Createspace
You've Been Hacked: 15 Hackers You Hope Your Computer Never Meets

ISBN: 9781490369396 / Angielski / Miękka / 2013 / 172 str.

ISBN: 9781490369396/Angielski/Miękka/2013/172 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
William Webb
cena: 40,43

 FAA Computer Security: Recommenations to Address Continuing Weaknesses U. S. General Accounting Office 9781493627431 Createspace
FAA Computer Security: Recommenations to Address Continuing Weaknesses

ISBN: 9781493627431 / Angielski / Miękka / 2000 / 44 str.

ISBN: 9781493627431/Angielski/Miękka/2000/44 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
U. S. General Accounting Office
cena: 60,65

 The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud Francisco Rocha Salvador Abreu Miguel Correia 9780769549781 IEEE Computer Society Press
The Next Frontier: Managing Data Confidentiality and Integrity in the Cloud

ISBN: 9780769549781 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9780769549781/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Francisco Rocha; Salvador Abreu; Miguel Correia
cena: 76,88

 Getting Started with Fortigate Volpe, Fabrizio 9781782178200 Packt Publishing
Getting Started with Fortigate

ISBN: 9781782178200 / Angielski / Miękka / 2013 / 126 str.

ISBN: 9781782178200/Angielski/Miękka/2013/126 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fabrizio Volpe; Fabbri Rosato
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic protocols, IPSEC and VPN with SSL, application and user control, web contents and mail scanning, endpoint checks, and more, all in a single platform. The heart of the appliance is the FortiOS (FortiOS 5 is the latest release) which is able to unify a friendly web interface with a powerful command line to deliver high performance. FortiGate is able to give users the results they usually achieve at a fraction of the cost of what they would have to...
FortiGate from Fortinet is a highly successful family of appliances enabled to manage routing and security on different layers, supporting dynamic pro...
cena: 142,38

 Introduction to Information Security and ISO 27001: 2013 It Governance Publishing 9781849285261 Itgp
Introduction to Information Security and ISO 27001: 2013

ISBN: 9781849285261 / Angielski / Miękka / 2013 / 56 str.

ISBN: 9781849285261/Angielski/Miękka/2013/56 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
It Governance; Steve G. Watkins
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security. It will ensure the systems you put in place are effective, reliable and auditable. This pocket guide will help you to: *Make informed decisions. Use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project....
The ideal primer for anyone implementing an Information Security Management System Written by an acknowledged expert on the new ISO27001 standard, An ...
cena: 76,84

Podprzednia  34  35  36  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia