• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2944077]
• Literatura piękna
 [1814251]
• Turystyka
 [70679]
• Informatyka
 [151074]
• Komiksy
 [35590]
• Encyklopedie
 [23169]
• Dziecięca
 [611005]
• Hobby
 [136031]
• AudioBooki
 [1718]
• Literatura faktu
 [225599]
• Muzyka CD
 [379]
• Słowniki
 [2916]
• Inne
 [443741]
• Kalendarze
 [1187]
• Podręczniki
 [166463]
• Poradniki
 [469211]
• Religia
 [506887]
• Czasopisma
 [481]
• Sport
 [61343]
• Sztuka
 [242115]
• CD, DVD, Video
 [3348]
• Technologie
 [219293]
• Zdrowie
 [98602]
• Książkowe Klimaty
 [124]
• Zabawki
 [2385]
• Puzzle, gry
 [3504]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7151]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5020

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Corporate Cyberwar (Mandarin) Dr Michael Teng 9789810713461 Corporate Turnaround Centre Pte Ltd
Corporate Cyberwar (Mandarin)

ISBN: 9789810713461 / Chiński / Miękka / 2012 / 68 str.

ISBN: 9789810713461/Chiński/Miękka/2012/68 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Teng
cena: 80,92

 Corporate Cyberwar Dr Michael Teng 9789810897574 Corporate Turnaround Centre Pte Ltd
Corporate Cyberwar

ISBN: 9789810897574 / Angielski / Miękka / 2011 / 60 str.

ISBN: 9789810897574/Angielski/Miękka/2011/60 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Teng
cena: 80,92

 Detecting and Combating Malicious Email Julie JCH Ryan (Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington Uni 9780128001103 Syngress Media,U.S.
Detecting and Combating Malicious Email

ISBN: 9780128001103 / Angielski / Miękka / 2014 / 94 str.

ISBN: 9780128001103/Angielski/Miękka/2014/94 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Julie JCH Ryan (Associate Professor and Chair of Engineering;Cade Kamachi

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The...

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The p...

cena: 167,87

 Routledge Handbook of Surveillance Studies Kirstie Ball Kevin Haggerty David Lyon 9781138026025 Routledge
Routledge Handbook of Surveillance Studies

ISBN: 9781138026025 / Angielski / Miękka / 2014 / 460 str.

ISBN: 9781138026025/Angielski/Miękka/2014/460 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kirstie Ball; Kevin Haggerty; David Lyon

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative Handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life.

With a collection of over forty essays from the leading names in...

Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency...

cena: 323,20

 Transnational Security Marie-Helen Maras 9781466594449 CRC Press
Transnational Security

ISBN: 9781466594449 / Angielski / Twarda / 2014 / 373 str.

ISBN: 9781466594449/Angielski/Twarda/2014/373 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Marie-Helen Maras

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional s agenda.

This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters,...

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Prevent...

cena: 567,11

 Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding Fiori, Alessandro 9781466650190 Information Science Reference
Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding

ISBN: 9781466650190 / Angielski / Twarda / 2014 / 363 str.

ISBN: 9781466650190/Angielski/Twarda/2014/363 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fiori
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able to access the information they desire without having to search through a mountain of unrelated data, so algorithms and methods for effectively seeking out pertinent information are of critical importance. Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding evaluates some of the existing approaches to information retrieval and summarization of digital documents, as well as current research and future...
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able...
cena: 896,90

 Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques Girod, Robert J. 9781482230727 CRC Press
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques

ISBN: 9781482230727 / Angielski / Twarda / 2014 / 564 str.

ISBN: 9781482230727/Angielski/Twarda/2014/564 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Sr. Robert J. Girod

Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the same sources. Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques reveals how intelligence officers and investigators conduct their tradecraft. You ll learn how...

Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandes...

cena: 759,15

 Information and Network Security Management: Strategic Concept Applications Dr Richmond S. Adebiaye 9781491236338 Createspace
Information and Network Security Management: Strategic Concept Applications

ISBN: 9781491236338 / Angielski / Miękka / 2013 / 396 str.

ISBN: 9781491236338/Angielski/Miękka/2013/396 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Richmond S. Adebiaye
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
cena: 453,17

 WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues Webster, Blake 9781493555871 Createspace
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues

ISBN: 9781493555871 / Angielski / Miękka / 2013 / 72 str.

ISBN: 9781493555871/Angielski/Miękka/2013/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Blake Webster
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websites that are visited by more than three hundred and seventy one million people each month. Survey website W3Techs reports around seventeen percent of the world's websites are powered by WordPress. Hackers tend to find WordPress to be easy prey, due to its extensive use of plugins, which total more than twenty five thousand. A recent study by Checkmarx found that no less than thirty percent of the top fifty WordPress plugins were determined to...
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websi...
cena: 24,23

 The Zealots Guide To Computer Security 2013 Taylor, Brian 9781484977248 Createspace
The Zealots Guide To Computer Security 2013

ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str.

ISBN: 9781484977248/Angielski/Miękka/2013/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Brian Taylor
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
cena: 80,88

 Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit Matthew Bailey 9783950309317 Nerel Publications
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit

ISBN: 9783950309317 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9783950309317/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Matthew Bailey
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can "feel" anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and...
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obta...
cena: 21,77

 
Network Coding

ISBN: 9781118759578 / Angielski / Digital / CD / DVD / / 2014 / 265 str.

ISBN: 9781118759578/Angielski/Digital / CD / DVD //2014/265 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Muriel Médard; Frank H. P. Fitzek; Daniel Lucani
cena: 389,45

 Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o Falco, Joe 9781475022797 Createspace
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o

ISBN: 9781475022797 / Angielski / Miękka / 2011 / 156 str.

ISBN: 9781475022797/Angielski/Miękka/2011/156 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Keith Stouffer; Joe Falco; Karen Scarfone
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g.,...
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include su...
cena: 97,07

 Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security Pauline Bowen Joan Hash Mark Wilson 9781475023732 Createspace
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security

ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str.

ISBN: 9781475023732/Angielski/Miękka/2012/180 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Pauline Bowen; Joan Hash; Mark Wilson
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
cena: 59,03

 Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95 Winograd, Theodore 9781475023794 Createspace
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95

ISBN: 9781475023794 / Angielski / Miękka / 2012 / 132 str.

ISBN: 9781475023794/Angielski/Miękka/2012/132 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Anoop Singhal; Theodore Winograd; Karen Scarfone
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA design and development based on Web services. This publication also provides practical, real-world guidance on current and emerging standards applicable to Web services, as well as background information on the most common security threats to SOAs based on Web services. This document presents information that is largely independent of particular hardware platforms, operating systems, and applications. Supplementary security mechanisms (i.e.,...
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA desi...
cena: 84,92

 Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special Hash, Joan 9781475027747 Createspace
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special

ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str.

ISBN: 9781475027747/Angielski/Miękka/2012/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tim Grance; Joan Hash; Jonathan Smith
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
cena: 64,53

 Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92 Karen Kent Murugiah Souppaya 9781475057652 Createspace
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92

ISBN: 9781475057652 / Angielski / Miękka / 2012 / 72 str.

ISBN: 9781475057652/Angielski/Miękka/2012/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Karen Kent; Murugiah Souppaya
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of...
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare ...
cena: 46,89

 Cybersecurity Government Accountability Office 9781482383966 Createspace
Cybersecurity

ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9781482383966/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Government Accountability Office
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
cena: 56,61

 Cybresecurity: Selected Legal Issues Edward C. Liu Gina Stevens Kathleen Ann Ruane 9781482384062 Createspace
Cybresecurity: Selected Legal Issues

ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str.

ISBN: 9781482384062/Angielski/Miękka/2013/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward C. Liu; Gina Stevens; Kathleen Ann Ruane
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
cena: 56,61

 Hackers and Crackers: Cyber-Criminal Have YOU Targeted! Preston, Treat 9781494783808 Createspace
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!

ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str.

ISBN: 9781494783808/Angielski/Miękka/2013/162 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Treat Preston
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
cena: 60,17

Podprzednia  37  38  39  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia