
ilość książek w kategorii: 5020
![]() |
Corporate Cyberwar (Mandarin)
ISBN: 9789810713461 / Chiński / Miękka / 2012 / 68 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,92 |
![]() |
Corporate Cyberwar
ISBN: 9789810897574 / Angielski / Miękka / 2011 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,92 |
![]() |
Detecting and Combating Malicious Email
ISBN: 9780128001103 / Angielski / Miękka / 2014 / 94 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The... Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The p... |
cena:
167,87 |
![]() |
Routledge Handbook of Surveillance Studies
ISBN: 9781138026025 / Angielski / Miękka / 2014 / 460 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the daily minutiae of social life. This innovative Handbook explores the empirical, theoretical and ethical issues around surveillance and its use in daily life. With a collection of over forty essays from the leading names in... Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency... |
cena:
323,20 |
![]() |
Transnational Security
ISBN: 9781466594449 / Angielski / Twarda / 2014 / 373 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing transnational security threats has proven to be a very difficult challenge for governments and institutions around the world. Transnational Security addresses these issues, which are at the forefront of every global security professional s agenda. This book analyzes the most pressing current transnational security threats, including weapons of mass destruction, terrorism, organized crime, cybercrime, natural disasters,... Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Prevent... |
cena:
567,11 |
![]() |
Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding
ISBN: 9781466650190 / Angielski / Twarda / 2014 / 363 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able to access the information they desire without having to search through a mountain of unrelated data, so algorithms and methods for effectively seeking out pertinent information are of critical importance. Innovative Document Summarization Techniques: Revolutionizing Knowledge Understanding evaluates some of the existing approaches to information retrieval and summarization of digital documents, as well as current research and future...
The prevalence of digital documentation presents some pressing concerns for efficient information retrieval in the modern age. Readers want to be able...
|
cena:
896,90 |
![]() |
Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques
ISBN: 9781482230727 / Angielski / Twarda / 2014 / 564 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the same sources. Advanced Criminal Investigations and Intelligence Operations: Tradecraft Methods, Practices, Tactics, and Techniques reveals how intelligence officers and investigators conduct their tradecraft. You ll learn how... Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandes... |
cena:
759,15 |
![]() |
Information and Network Security Management: Strategic Concept Applications
ISBN: 9781491236338 / Angielski / Miękka / 2013 / 396 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for both undergraduate and graduate students. This book provides a unique, in-depth look at the business challenges and Information security strategic concept currently being applied in various organizations, including Software and Database security concepts, and how other security protocols vulnerabilities are exploited through unethical hacking and cracking activities. The hands-on activities, PowerPoint presentation for Instructors and Students'...
Information and Network Security Management (Strategic Concept Applications) Second Edition is a comprehensive, modern and resourceful textbook for bo...
|
cena:
453,17 |
![]() |
WordPress Security Fundamentals: Protect Your Website from Hackers and Identify WordPress Security Issues
ISBN: 9781493555871 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websites that are visited by more than three hundred and seventy one million people each month. Survey website W3Techs reports around seventeen percent of the world's websites are powered by WordPress. Hackers tend to find WordPress to be easy prey, due to its extensive use of plugins, which total more than twenty five thousand. A recent study by Checkmarx found that no less than thirty percent of the top fifty WordPress plugins were determined to...
Hacking attempts on WordPress sites are on the rise. According to BBC News, the WordPress platform currently powers more than sixty four million websi...
|
cena:
24,23 |
![]() |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
cena:
80,88 |
![]() |
Complete Guide to Anonymous Torrent Downloading and File-Sharing: A Practical, Step-By-Step Guide on How to Protect Your Internet Privacy and Anonymit
ISBN: 9783950309317 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obtain all kinds of great media on the Internet, ranging from full-length movies, music files, video clips, ebooks, apps, software programs, images, documents to basically any digital content you can think of. Downloading and sharing torrents can "feel" anonymous, but this is deceptive. Unless you take some extra steps to protect your privacy while downloading and sharing torrents, the prying eyes of unwelcome snoops can eavesdrop, monitor and...
Download & share torrents anonymously Don't be exposed and at risk. Take the steps in this Guide. Torrent file-sharing is a quick and easy way to obta...
|
cena:
21,77 |
![]() |
Network Coding
ISBN: 9781118759578 / Angielski / Digital / CD / DVD / / 2014 / 265 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
389,45 |
![]() |
Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and o
ISBN: 9781475022797 / Angielski / Miękka / 2011 / 156 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) are often found in the industrial control sectors. ICS are typically used in industries such as electric, water and wastewater, oil and natural gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g.,...
NIST Special Publication 800-82. This document provides guidance for establishing secure industrial control systems (ICS). These ICS, which include su...
|
cena:
97,07 |
![]() |
Information Security Handbook: A Guide for Managers - Recommendations of the National Institute of Standards and Technology: Information Security
ISBN: 9781475023732 / Angielski / Miękka / 2012 / 180 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to establish and implement an information security program. Typically, the organization looks to the program for overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements. The topics within this document were selected based on the laws and regulations relevant to information security, including the Clinger-Cohen Act of 1996, the...
This Information Security Handbook provides a broad overview of information security program elements to assist managers in understanding how to estab...
|
cena:
59,03 |
![]() |
Guide to Secure Web Services: Recommendations of the National Institute of Standards and Technology: NIST Special Publication 800-95
ISBN: 9781475023794 / Angielski / Miękka / 2012 / 132 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA design and development based on Web services. This publication also provides practical, real-world guidance on current and emerging standards applicable to Web services, as well as background information on the most common security threats to SOAs based on Web services. This document presents information that is largely independent of particular hardware platforms, operating systems, and applications. Supplementary security mechanisms (i.e.,...
This publication of the NIST seeks to assist organizations in understanding the challenges in integrating information security practices into SOA desi...
|
cena:
84,92 |
![]() |
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special
ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
|
cena:
64,53 |
![]() |
Guide to Computer Security Log Management: Recommendations of the National Institute of Standards and Technology: Special Publication 800-92
ISBN: 9781475057652 / Angielski / Miękka / 2012 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL's responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of...
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare ...
|
cena:
46,89 |
![]() |
Cybersecurity
ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
|
cena:
56,61 |
![]() |
Cybresecurity: Selected Legal Issues
ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
|
cena:
56,61 |
![]() |
Hackers and Crackers: Cyber-Criminal Have YOU Targeted!
ISBN: 9781494783808 / Angielski / Miękka / 2013 / 162 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in cyber crime. It is part of the hacker series from ForensicsNation, one of the leading cyber crime fighters in the world. It can be considered the hackers handbook describing events like hackers mom, hacker gangs, cell phone spying, computer intrusion and much more. It demonstrates a hacker's delight and the types of various cyber crimes. It is hacking exposed in its finest with hacking the art of exploitation revealed in all of its ugly details....
Hackers and Crackers - The Art of Exploitation is a book that examines cyber crime and how a person and business can protect against the increase in c...
|
cena:
60,17 |