
ilość książek w kategorii: 5082
![]() |
Basics on Public Key Infrastructure (PKI)
ISBN: 9798215252864 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Basics of OAuth Securely Connecting Your Applications
ISBN: 9798215349199 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 伺服器
ISBN: 9798987508961 / Chiński Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
搭建自己的 IPsec VPN, OpenVPN 和 WireGuard 服务器
ISBN: 9798987508954 / Chiński Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Hidden Traps of the Internet: Building and Protecting Your Online Platform
ISBN: 9781738625109 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Cost Savvy Secure Cloud
ISBN: 9788119682324 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Be Scam Smart: A Guide to Outsmarting Online and Offline Fraudsters
ISBN: 9798215186824 / Angielski / Miękka / 2023 / 174 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Cyber Shield
ISBN: 9798822932081 / Angielski / Miękka / 2024 / 174 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,69 |
![]() |
Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally
ISBN: 9781517160081 / Angielski / Miękka / 2015 / 270 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within this book lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever. The Invisibility Toolkit is the ultimate guide for anyone who values their privacy or needs to disappear. Whether you're running from stalkers or...
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within...
|
cena:
64,70 |
![]() |
Post-Quantum Cryptography Using Complexity
ISBN: 9781469959139 / Angielski / Miękka / 2009 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
|
cena:
64,70 |
![]() |
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology
ISBN: 9781477621059 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,70 |
![]() |
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa
ISBN: 9781478178491 / Angielski / Miękka / 2012 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,70 |
![]() |
Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800
ISBN: 9781478180197 / Angielski / Miękka / 2012 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,70 |
![]() |
Cybersecurity: Authoritative Reports and Resources
ISBN: 9781478217664 / Angielski / Miękka / 2012 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
64,70 |
![]() |
Forensic Filtering of Cell Phone Protocols
ISBN: 9781495988042 / Angielski / Miękka / 2008 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager protocol exchanges with a device is proposed as a means to reduce risk.
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a pho...
|
cena:
64,70 |
![]() |
Using the BACnet Communications DLL v1.0
ISBN: 9781495990519 / Angielski / Miękka / 2008 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
|
cena:
64,70 |
![]() |
Recommendation for Applications Using Approved Hash Algorithms: NIST Special Publication 800-107 Revision 1
ISBN: 9781497467859 / Angielski / Miękka / 2012 / 28 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. Th...
|
cena:
64,70 |
![]() |
Cybersecurity: Authoritative Reports and Resources, by Topic
ISBN: 9781502998385 / Angielski / Miękka / 2014 / 106 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups.
<...
|
cena:
64,70 |
![]() |
Hacking: Ultimate Hacking for Beginners, How to Hack
ISBN: 9781514125335 / Angielski / Miękka / 2015 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hacking 101 Your Ultimate Hacking Guide
So you want to be a hacker? You want to know how to get into a system and look like a genius while you spot system vulnerabilities. In this world, you can either be a good hacker or a bad hacker. Whichever that is, totally depends on your choice. This book teaches ethical hacking and guides anyone interested to an in-depth discussion about what hacking is all about. Also, this book provides the right hacking mindset that will turn you into a trustworthy hacker. You will learn how to classify various kinds of hackers, and identify... Hacking 101 Your Ultimate Hacking Guide
So you want to be a hacker? You want to know how to get into a system and look like a genius whi... |
cena:
64,70 |