• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5082

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 NISTIR 7298 r2 Glossary of Key Information Security Terms: NISTIR 7298 r2 National Institute of Standards and Tech 9781547202560 Createspace Independent Publishing Platform
NISTIR 7298 r2 Glossary of Key Information Security Terms: NISTIR 7298 r2

ISBN: 9781547202560 / Angielski / Miękka / 2013 / 224 str.

ISBN: 9781547202560/Angielski/Miękka/2013/224 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
National Institute of Standards and Tech
cena: 68,99

 Cloud-Driven Defense: Integrating Cybersecurity Principles into Scalable IT Cloud Development for Secure Digital Transformation Mariam Adetoun Sanusi 9782354412715 Emphaloz Publishing House
Cloud-Driven Defense: Integrating Cybersecurity Principles into Scalable IT Cloud Development for Secure Digital Transformation

ISBN: 9782354412715 / Angielski

ISBN: 9782354412715/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,02

 Shadows in the Cloud: Navigating Threats Beyond the Surface Web Enyinaya Okafor 9787361813838 Emphaloz Publishing House
Shadows in the Cloud: Navigating Threats Beyond the Surface Web

ISBN: 9787361813838 / Angielski

ISBN: 9787361813838/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,02

 IoT Armageddon: Securing the Internet of Everything Against Invisible Attacks Adedayo Jigida 9788839817754 Plexity Digital
IoT Armageddon: Securing the Internet of Everything Against Invisible Attacks

ISBN: 9788839817754 / Angielski

ISBN: 9788839817754/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,02

 A Product Manager's Guide to Building Cyber-Resilient Products Adebayo Kalejaiye 9784736138466 Emphaloz Digital
A Product Manager's Guide to Building Cyber-Resilient Products

ISBN: 9784736138466 / Angielski

ISBN: 9784736138466/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,02

 Understanding Cyber Threats Through Behavioral Intelligence Taiwo Osiyemi 9785376339084 Plexity Digital
Understanding Cyber Threats Through Behavioral Intelligence

ISBN: 9785376339084 / Angielski

ISBN: 9785376339084/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,02

 Cyber Conflict After Stuxnet: Essays from the Other Bank of the Rubicon Adam Segal Hannah Pitts Karl Grindal 9780989327442 Cyber Conflict Studies Association
Cyber Conflict After Stuxnet: Essays from the Other Bank of the Rubicon

ISBN: 9780989327442 / Angielski / Miękka / 2016 / 206 str.

ISBN: 9780989327442/Angielski/Miękka/2016/206 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Adam Segal; Karl Grindal
cena: 69,06

 The Social Engineer's Playbook: A Practical Guide to Pretexting Jeremiah Talamantes 9780692306611 Hexcode Publishing
The Social Engineer's Playbook: A Practical Guide to Pretexting

ISBN: 9780692306611 / Angielski / Miękka / 2014 / 202 str.

ISBN: 9780692306611/Angielski/Miękka/2014/202 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jeremiah Talamantes
cena: 69,15

 The Weakest Security Link Series: 1st Edition Medina, Luis F. 9780595264940 Writers Club Press
The Weakest Security Link Series: 1st Edition

ISBN: 9780595264940 / Angielski / Miękka / 2003 / 200 str.

ISBN: 9780595264940/Angielski/Miękka/2003/200 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Luis F. Medina
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understanding of networking technologies can benefit from this book. Unlike other network security books written with in-depth coverage of things you don t need, this book takes a different spin on security: The focus of this book is to explore and identify the weak security links in your entire network. We will achieve this by addressing the basic and most overlooked security steps in your network. When you purchase this book, you will receive a free...
By focusing on your entire network security, this book is designed to save you time and effort in improving security. Anyone with a basic understandin...
cena: 69,17

 Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far  9781683504825 Morgan James Publishing
Infosec Rock Star: How to Accelerate Your Career Because Geek Will Only Get You So Far

ISBN: 9781683504825 / Angielski / Miękka / 2018 / 218 str.

ISBN: 9781683504825/Angielski/Miękka/2018/218 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Have you noticed that some people in infosec simply have more success than others, however they may define success?

Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock...

Have you noticed that some people in infosec simply have more success than others, however they may define success?

Some people are simply m...

cena: 69,17

 Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet Eric Cole 9781683505334 Morgan James Publishing
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet

ISBN: 9781683505334 / Angielski / Miękka / 2018 / 182 str.

ISBN: 9781683505334/Angielski/Miękka/2018/182 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eric Cole
There are a myriad of ways to be harmed online, often with irreparable damage. Cyber security expert Cole provides a layman's look at how individuals and businesses can protect themselves online.
There are a myriad of ways to be harmed online, often with irreparable damage. Cyber security expert Cole provides a layman's look at how individuals ...
cena: 69,17

 Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities: Testimony Before the House Committee on Armed Services House Committee on Armed Services 9781979184878 Createspace Independent Publishing Platform
Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities: Testimony Before the House Committee on Armed Services

ISBN: 9781979184878 / Angielski / Miękka / 2017 / 98 str.

ISBN: 9781979184878/Angielski/Miękka/2017/98 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,18

 Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet McCarthy, N. K. 9780990911807 McCarthy Diversified Svcs Inc
Mommy! There's a Monster in our Computer: The book every parent should read to their child before they go on the Internet

ISBN: 9780990911807 / Angielski / Miękka / 2014 / 18 str.

ISBN: 9780990911807/Angielski/Miękka/2014/18 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
N K McCarthy; Bethlehe Ill (Lehigh Univ. Arthur King;Dr Abby Anderson
The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively impacted by the Internet. But if they are, it can be devastating. Cyber Bullying KILLS kids. (This is book is dedicated to them and you can read some of their names inside.) Predators scour the Internet looking for victims. Identity Theft affects MILLIONS of people in the US and young adults are being targeted too. Phishing is a very common attack methodology and can literally take money out of your bank account. As a Computer Security...
The book that every parent should read to their child before they go on the Internet. The odds are very good that your child will not be negatively im...
cena: 69,36

 The Truth Machine: The Blockchain and the Future of Everything Paul Vigna Michael J. Casey 9781250304179 Picador USA
The Truth Machine: The Blockchain and the Future of Everything

ISBN: 9781250304179 / Angielski / Miękka / 2019 / 336 str.

ISBN: 9781250304179/Angielski/Miękka/2019/336 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Paul Vigna; Michael J. Casey
cena: 69,36

 
Key Security Concepts that all CISOs Should Know-Cyber Guardians: A CISO's Guide to Protecting the Digital World

ISBN: 9781456649562 / Angielski

ISBN: 9781456649562/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 69,36

 Hacking Wireless Networks - The ultimate hands-on guide Kolokithas, Andreas 9781508476344 Createspace
Hacking Wireless Networks - The ultimate hands-on guide

ISBN: 9781508476344 / Angielski / Miękka / 2015 / 430 str.

ISBN: 9781508476344/Angielski/Miękka/2015/430 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Andreas Kolokithas
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup your own hacking lab and learn through practice? If yes, then this is the book for you Hacking Wireless Networks - The ultimate hands-on guide, is a book written for people who seek to practice the techniques of assessing the security of wireless infrastructures.Through 30 real life scenarios and more than 300 figures the book examines in details the following areas: - Discovery and Profiling of wireless networks - Denial of Service attacks -...
Are you tired of buying security books and at the end discover that they contain only theory and no practical examples at all? Do you want to setup yo...
cena: 69,84

 
Elixir on the Chain: A Developer's Guide for Building High-Performance Blockchain Network

ISBN: 9798301357114 / Angielski / Miękka / 2024 / 168 str.

ISBN: 9798301357114/Angielski/Miękka/2024/168 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 70,00

 From Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe Featuring Cybersecurity And Compliance Experts From Around The World Featuring Cybersecurity And Compliance Experts From 9781636983851 Morgan James Publishing
From Exposed to Secure: The Cost of Cybersecurity and Compliance Inaction and the Best Way to Keep You Company Safe

ISBN: 9781636983851 / Angielski

ISBN: 9781636983851/Angielski

Termin realizacji zamówienia: ok. 8-10 dni roboczych.
Featuring Cybersecurity And Compliance Experts From Around T
cena: 70,20

 Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack! Welsh, Joshua 9781542745376 Createspace Independent Publishing Platform
Tor: Tor and the Deep Web: A Guide to Become Anonymous Online, Conceal Your IP Address, Block NSA Spying and Hack!

ISBN: 9781542745376 / Angielski / Miękka / 2017 / 58 str.

ISBN: 9781542745376/Angielski/Miękka/2017/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous Online Today The Internet is a wonderful resource which has allowed people to access a fountain of knowledge with the simple click of a button. The internet has grown considerably fast in the last decade, and it is still expanding at extraordinary rates. But with this incredible tool comes a danger The government has been using our vast resource to spy on individuals and businesses, overstepping their role as an entity that exists to serve the...
Want to learn how to hide your I.P address? Tired of the NSA spying on you? Want to learn how to hack? This Book Will Teach You How To be Anonymous On...
cena: 70,32

 Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Zach Codings 9781694041562 Independently Published
Ethical Hacking: A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security

ISBN: 9781694041562 / Angielski / Miękka / 2019 / 142 str.

ISBN: 9781694041562/Angielski/Miękka/2019/142 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 70,32

Podprzednia  43  44  45  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia