• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5007

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Mastering FreeBSD and OpenBSD Security Yanek Korff Bruce Potter Paco Hope 9780596006266 O'Reilly Media
Mastering FreeBSD and OpenBSD Security

ISBN: 9780596006266 / Angielski / Miękka / 2005 / 445 str.

ISBN: 9780596006266/Angielski/Miękka/2005/445 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Yanek Korff; Bruce Potter; Paco Hope

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide significant security advantages over Linux. Although a lot can be said for the robustness, clean organization, and stability of the BSD operating systems, security is one of the main reasons system administrators use these two platforms.There are plenty of books to help you get a FreeBSD or OpenBSD system off the ground, and all of them touch on security to some extent, usually dedicating a chapter to the subject. But, as security is commonly named...

FreeBSD and OpenBSD are increasingly gaining traction in educational institutions, non-profits, and corporations worldwide because they provide sig...

cena: 205,75

 Windows Server Hacks: 100 Industrial-Strength Tips & Tools Tulloch, Mitch 9780596006471 O'Reilly Media
Windows Server Hacks: 100 Industrial-Strength Tips & Tools

ISBN: 9780596006471 / Angielski / Miękka / 2004 / 357 str.

ISBN: 9780596006471/Angielski/Miękka/2004/357 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mitch Tulloch

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script But what about the other ten percent of the time? While it's true that most...

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, cons...

cena: 115,25

 Managing Security with Snort and IDS Tools Cox, Kerry J. 9780596006617 O'Reilly Media
Managing Security with Snort and IDS Tools

ISBN: 9780596006617 / Angielski / Miękka / 2004 / 269 str.

ISBN: 9780596006617/Angielski/Miękka/2004/269 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kerry Cox; Christopher Gerg

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the...

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure t...

cena: 153,53

 Computer Security Basics: Computer Security Lehtinen, Rick 9780596006693 O'Reilly Media
Computer Security Basics: Computer Security

ISBN: 9780596006693 / Angielski / Miękka / 2006 / 296 str.

ISBN: 9780596006693/Angielski/Miękka/2006/296 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rick Lehtinen; Deborah Russell; Sr. G. T. Gangemi

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.



The new edition builds on the well-established principles developed in the original edition and thoroughly updates that core knowledge. For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, Computer Security Basics 2nd Edition offers a clear overview of the security...

This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamenta...

cena: 172,89

 SpamAssassin Alan Schwartz 9780596007072 O'Reilly Media
SpamAssassin

ISBN: 9780596007072 / Angielski / Miękka / 2004 / 224 str.

ISBN: 9780596007072/Angielski/Miękka/2004/224 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Alan Schwartz

The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health products is fierce. But for organizations, the cost of spam in lost productivity and burned bandwidth is astronomical. While society is grappling with a solution to the burgeoning crisis of spam proliferation, the pressure is on system administrators to find a solution to this massive problem in-house. And fast.Sys admins can field scores of complaints and spend months testing software suites that turn out to be too aggressive, too passive, or too...

The annoyance factor for individual users whose email is crammed with pitches for pornography, absurd moneymaking schemes, and dubious health produ...

cena: 115,25

 Digital Identity: Unmasking Identity Management Architecture (Ima) Windley, Phillip J. 9780596008789 O'Reilly Media
Digital Identity: Unmasking Identity Management Architecture (Ima)

ISBN: 9780596008789 / Angielski / Miękka / 2005 / 256 str.

ISBN: 9780596008789/Angielski/Miękka/2005/256 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Phillip J. Windley

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce.

Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with...

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. ...

cena: 134,32

 Ssh, the Secure Shell: The Definitive Guide: The Definitive Guide Daniel J Barrett 9780596008956 O'Reilly Media
Ssh, the Secure Shell: The Definitive Guide: The Definitive Guide

ISBN: 9780596008956 / Angielski / Miękka / 2005 / 670 str.

ISBN: 9780596008956/Angielski/Miękka/2005/670 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Daniel J Barrett

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest...

Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption fo...

cena: 172,89

 Security Power Tools Bryan Burns Jennifer Stisa Granick Steve Manzuik 9780596009632 O'Reilly Media
Security Power Tools

ISBN: 9780596009632 / Angielski / Miękka / 2007 / 860 str.

ISBN: 9780596009632/Angielski/Miękka/2007/860 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bryan Burns; Jennifer Stisa Granick; Steve Manzuik

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms.

Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that...

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Sec...

cena: 230,54

 Internet Forensics Robert Jones 9780596100063 O'Reilly Media
Internet Forensics

ISBN: 9780596100063 / Angielski / Miękka / 2005 / 242 str.

ISBN: 9780596100063/Angielski/Miękka/2005/242 str.

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Robert Jones

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to Internet Forensics from O'Reilly, there's something you can do about it.

This practical guide to defending against Internet fraud gives you the skills you need to uncover the origins of the spammers, con artists, and identity thieves that plague the Internet. Targeted primarily at the developer...

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card ...

cena: 160,61

 Backup & Recovery: Inexpensive Backup Solutions for Open Systems Preston, W. Curtis 9780596102463 O'Reilly Media
Backup & Recovery: Inexpensive Backup Solutions for Open Systems

ISBN: 9780596102463 / Angielski / Miękka / 2007 / 760 str.

ISBN: 9780596102463/Angielski/Miękka/2007/760 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
W. Curtis Preston

Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various databases -- this new guide is a complete overhaul of Unix Backup & Recovery by the same author, now revised and expanded with over 75% new material.

Backup & Recovery starts with a complete overview of backup philosophy and design, including the basic backup utilities of tar, dump, cpio, ntbackup, ditto, and rsync. It then explains several open source backup products that automate backups using those utilities, including AMANDA,...

Packed with practical, freely available backup and recovery solutions for Unix, Linux, Windows, and Mac OS X systems -- as well as various database...

cena: 211,32

 Screenos Cookbook: Time-Saving Techniques for Screenos Administrators Brunner, Stefan 9780596510039 O'Reilly Media
Screenos Cookbook: Time-Saving Techniques for Screenos Administrators

ISBN: 9780596510039 / Angielski / Miękka / 2008 / 842 str.

ISBN: 9780596510039/Angielski/Miękka/2008/842 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Stefan Brunner; Vik Davar; Joe Kelly

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep ScreenOS systems on track.

ScreenOS Cookbook gives you real-world fixes, techniques, and configurations that save time -- not hypothetical situations out of a textbook. The book comes directly from the experience of engineers...

Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ...

cena: 226,33

 Network Security Hacks: Tips & Tools for Protecting Your Privacy Lockhart, Andrew 9780596527631 O'Reilly Media
Network Security Hacks: Tips & Tools for Protecting Your Privacy

ISBN: 9780596527631 / Angielski / Miękka / 2006 / 480 str.

ISBN: 9780596527631/Angielski/Miękka/2006/480 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Andrew Lockhart

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well.

This second edition of Network Security...

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, netw...

cena: 153,68

 Maximum Windows 2000 Security Mark Burnett L. J. Locher Chris Doyle 9780672319655 Sams
Maximum Windows 2000 Security

ISBN: 9780672319655 / Angielski / Miękka / 2001 / 624 str.

ISBN: 9780672319655/Angielski/Miękka/2001/624 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark Burnett; L. J. Locher; Chris Doyle

Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional Protocols,
  • Web Server Security,
  • Denial of Service Attacks,
  • Intrusion Detection,
  • Hacking Secure Code in Windows 2000.

  • Written from the hacker's perspective, "Maximum Windows 2000 Security" is a comprehensive, solutions-oriented guide to Windows 2000 security.

    To...

    cena: 211,32

     Microsoft ISA Server 2000 Zubair Alexander 9780672321009 Pearson Education (US)
    Microsoft ISA Server 2000

    ISBN: 9780672321009 / Angielski / Miękka / 2001 / 336 str.

    ISBN: 9780672321009/Angielski/Miękka/2001/336 str.

    Termin realizacji zamówienia: ok. 16-18 dni roboczych.
    Zubair Alexander
    Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple firewall product. By combining enterprise firewall and high-performance Web cache functions, ISA Server provides a common management infrastructure that reduces network complexity and costs. ISA Server protects networks from unauthorized access, inspects traffic, and alerts network administrators to attacks. The readers of this book will receive comprehensive appendices on useful ISA Server information. Readers will find information in this book...
    Secure and enhance network performance with Microsoft ISA Server 2000. Microsoft Internet Security and Acceleration Server 2000 is more than a simple ...
    cena: 172,89

     Open Source E-mail Security Richard Blum 9780672322372 Sams
    Open Source E-mail Security

    ISBN: 9780672322372 / Angielski / Miękka / 2001 / 504 str.

    ISBN: 9780672322372/Angielski/Miękka/2001/504 str.

    Termin realizacji zamówienia: ok. 16-18 dni roboczych.
    Richard Blum
    Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts crucial to stopping spam messages. It presents configurations showing how to avoid accepting messages from known open relays and how to filter known spam messages. It also covers advanced security topics.
    Teaches you the technology underlying secure e-mail systems. This book explains the secure MIME (S/MIME) protocol. It also explains the concepts cruci...
    cena: 153,68

     Pseudorandomness &Amp; Cryptographic Applications Luby, Michael 9780691025469 Princeton University Press
    Pseudorandomness &Amp; Cryptographic Applications

    ISBN: 9780691025469 / Angielski / Miękka / 1996 / 248 str.

    ISBN: 9780691025469/Angielski/Miękka/1996/248 str.

    Termin realizacji zamówienia: ok. 30 dni roboczych.
    Michael Luby;Luby

    A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a random string to any efficient adversary. One immediate application of a pseudorandom generator is the construction of a private key cryptosystem that is secure against chosen plaintext attack.


    There do not seem to be natural examples of functions that are pseudorandom generators. On the other hand, there do seem to be a variety of natural examples of another basic primitive: the one-way function. A function is one-way if it is easy to...

    A pseudorandom generator is an easy-to-compute function that stretches a short random string into a much longer string that "looks" just like a ran...

    cena: 449,67

     Internet Resources for Leisure and Tourism William Theobald H. E. Dunsmore William F. Theobald 9780750646444 Butterworth-Heinemann
    Internet Resources for Leisure and Tourism

    ISBN: 9780750646444 / Angielski / Miękka / 1999 / 254 str.

    ISBN: 9780750646444/Angielski/Miękka/1999/254 str.

    Termin realizacji zamówienia: ok. 22 dni roboczych.
    William Theobald; H. E. Dunsmore; William F. Theobald
    There is a wealth of useful information for travel and tourism students on the World Wide Web. This volume provides an introduction to the Internet, as well as a complete route guide to free travel and tourism resources available on it.
    There is a wealth of useful information for travel and tourism students on the World Wide Web. This volume provides an introduction to the Internet, a...
    cena: 224,78

     Network Security Owen Poole 9780750650335 Butterworth-Heinemann
    Network Security

    ISBN: 9780750650335 / Angielski / Miękka / 2002 / 224 str.

    ISBN: 9780750650335/Angielski/Miękka/2002/224 str.

    Termin realizacji zamówienia: ok. 22 dni roboczych.
    Owen Poole
    With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comprehensive review of network security issues with particular relevance to corporate networks from an administrative and user perspective. The book is designed to be particularly suitable for system administrators and users who wish to learn more about the security issues faced by their organization.
    With the advent of the Internet and its integration into corporate networks, consideration of network security is paramount. This text provides a comp...
    cena: 278,55

     I-Way Robbery: Crime on the Internet William C. Boni (Director, Information Security for Motorola Corporation. He has worked as the Director of Information P 9780750670296 Elsevier Science & Technology
    I-Way Robbery: Crime on the Internet

    ISBN: 9780750670296 / Angielski / Miękka / 1999 / 256 str.

    ISBN: 9780750670296/Angielski/Miękka/1999/256 str.

    Termin realizacji zamówienia: ok. 16-18 dni roboczych.
    Information Security for Motorola William C. Boni (Director; le CISSP (Security consultant CPP CFE Gerald L. Kovacich

    I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as the new crime environment for the 21st century. The book provides an overview of the Internet, its impact on nations, societies, criminals, security officers, and law enforcement professionals, and includes recommended basic, protective measures.

    I-Way Robbery is written in non-technical terms. It is also an excellent reference for business and government agency managers who must understand their responsibilities as they relate to asset...

    I-Way Robbery is for security, investigative, law enforcement, and other criminal justice professionals, offering a unique look at the Internet as ...

    cena: 549,70

     Netspionage: The Global Threat to Information William C. Boni, Gerald Kovacich 9780750672573 Elsevier Science & Technology
    Netspionage: The Global Threat to Information

    ISBN: 9780750672573 / Angielski / Miękka / 2000 / 280 str.

    ISBN: 9780750672573/Angielski/Miękka/2000/280 str.

    Termin realizacji zamówienia: ok. 16-18 dni roboczych.
    William C. Boni;Gerald Kovacich
    This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information gatherers in public and private sectors, they can quickly be adopted for Netspionage use. It then moves on to describe how the Internet and associated technologies have already revolutionized the collection and analysis of competitive information. The convergence of dependency on networked and exploitation tools (often propagated by "hackers," "cyberpunks," and even intelligence agencies) has already resulted in several incidents that foreshadow...
    This book begins by laying out a history of espionage that clearly shows that when a new technology or technique becomes available to the information ...
    cena: 307,32

    Podprzednia  4  5  6  Następna

    Facebook - konto krainaksiazek.pl



    Opinie o Krainaksiazek.pl na Opineo.pl

    Partner Mybenefit

    Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

    Czytaj nas na:

    Facebook - krainaksiazek.pl
    • książki na zamówienie
    • granty
    • książka na prezent
    • kontakt
    • pomoc
    • opinie
    • regulamin
    • polityka prywatności

    Zobacz:

    • Księgarnia czeska

    • Wydawnictwo Książkowe Klimaty

    1997-2026 DolnySlask.com Agencja Internetowa

    © 1997-2022 krainaksiazek.pl
         
    KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
    Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
    KrainaKsiazek.PL - Księgarnia Internetowa
    Polityka prywatnosci - link
    Krainaksiazek.pl - płatnośc Przelewy24
    Przechowalnia Przechowalnia