
ilość książek w kategorii: 5132
![]() |
Information Security: Contemporary Cases: Contemporary Cases
ISBN: 9780763738198 / Angielski / Miękka / 2006 / 214 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And...
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive C...
|
cena:
301,94 |
![]() |
The Development of Component-Based Information Systems
ISBN: 9780765612489 / Angielski / Twarda / 2006 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This work provides a comprehensive overview of research and practical issues relating to component-based development information systems (CBIS). Spanning the organizational, developmental, and technical aspects of the subject, the original research included here provides fresh insights into successful CBIS technology and application. Part I covers component-based development methodologies and system architectures. Part II analyzes different aspects of managing component-based development. Part III investigates component-based development with commercial off-the-shelf products (COTS),...
This work provides a comprehensive overview of research and practical issues relating to component-based development information systems (CBIS). Spann...
|
cena:
813,07 |
![]() |
Underwriting the Internet: How Technical Advances, Financial Engineering, and Entrepreneurial Genius Are Building the Information Highway
ISBN: 9780765615183 / Angielski / Miękka / 2004 / 297 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Filled with fascinating glimpses behind today's financial headlines, Underwriting the Internet is a fast-paced story of one of the most exciting industrial developments that has ever occurred. This comprehensive treatment of the technical advances, financial engineering, and entrepreneurial genius behind the Internet revolution includes actual corporate case studies, stock market analyses, and synopses of regulatory investigations. While focusing on the Internet's commercial development, the author describes the little understood technical and financial areas of the Internet revolution. He...
Filled with fascinating glimpses behind today's financial headlines, Underwriting the Internet is a fast-paced story of one of the most exciting indus...
|
cena:
201,99 |
![]() |
Electronic Resources: Use and User Behavior
ISBN: 9780789003720 / Angielski / Twarda / 1998 / 154 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In Philosophies of Reference Service, reference librarians share with you their reflective thinking about what they do as service providers. An important addition to the personal and occupational library of anyone in reference services, this book discusses the origins of reference service, its founding principles, the pleasures and pitfalls of the reference encounter, delivering high-quality service, and much, much more In a clever juxtaposition of the fundamentals of reference service provision with top-notch thinking about the role of the reference librarian and what makes a...
In Philosophies of Reference Service, reference librarians share with you their reflective thinking about what they do as service providers. An import...
|
cena:
714,51 |
![]() |
High-Level Subject Access Tools and Techniques in Internet Cataloging
ISBN: 9780789020246 / Angielski / Twarda / 2003 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and early development of high-level subject access. It examines Web tools and traditionally maintained library structures that facilitate the automated relation of resources to high-level subject categories based on the descriptive metadata that already exists in traditional library records. It includes a research study of high-level subject browse structures, as well as hands-on reports of actual projects and development activities and an examination... Is your library's portal as efficient as it could be?
High-Level Subject Access Tools and Techniques explores the potential and ea... |
cena:
285,76 |
![]() |
A Guide to Docutek Inc.'s Eres Software: A Way to Manage Electronic Reserves
ISBN: 9780789027825 / Angielski / Twarda / 2005 / 140 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn how other libraries have enhanced their services with an effective electronic reserves system
As the number of libraries offering electronic reserves grows larger and larger, so has the need for an e-reserves option that's efficient, cost-effective, and easy-to-use. A Guide to Docutek Inc.'s ERes Software: A Way to Manage Electronic Reserves provides first-hand insights and information on how several academic libraries selected and implemented one of the leading e-reserves systems, with an installed base of more than 400 libraries worldwide. ERes(TM) users in a variety of... Learn how other libraries have enhanced their services with an effective electronic reserves system
As the number of libraries offering el... |
cena:
270,97 |
![]() |
A Guide to Docutek Inc.'s Eres Software: A Way to Manage Electronic Reserves
ISBN: 9780789027832 / Angielski / Miękka / 2005 / 138 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn how other libraries have enhanced their services with an effective electronic reserves system
As the number of libraries offering electronic reserves grows larger and larger, so has the need for an e-reserves option that's efficient, cost-effective, and easy-to-use. A Guide to Docutek Inc.'s ERes Software: A Way to Manage Electronic Reserves provides first-hand insights and information on how several academic libraries selected and implemented one of the leading e-reserves systems, with an installed base of more than 400 libraries worldwide. ERes(TM) users in a variety of... Learn how other libraries have enhanced their services with an effective electronic reserves system
As the number of libraries offering el... |
cena:
172,42 |
![]() |
Web Search Savvy: Strategies and Shortcuts for Online Research
ISBN: 9780805838596 / Angielski / Twarda / 2004 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locating, retrieving, and evaluating information on the Internet. Utilizing her experience as a reporter working on deadline, author Barbara G. Friedman offers the most effective methods for finding useful and trustworthy data online, and presents these techniques in a straightforward, user-friendly manner.
Anyone who uses the Internet for research will find much of value here, including techniques that harness the power of advanced searches to... Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locati...
|
cena:
763,79 |
![]() |
Web Search Savvy: Strategies and Shortcuts for Online Research
ISBN: 9780805838602 / Angielski / Miękka / 2004 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locating, retrieving, and evaluating information on the Internet. Utilizing her experience as a reporter working on deadline, author Barbara G. Friedman offers the most effective methods for finding useful and trustworthy data online, and presents these techniques in a straightforward, user-friendly manner.
Anyone who uses the Internet for research will find much of value here, including techniques that harness the power of advanced searches to... Web Search Savvy: Strategies and Shortcuts for Online Research provides readers of all skill levels with efficient search strategies for locati...
|
cena:
201,99 |
![]() |
Image Retrieval: Theory and Research
ISBN: 9780810847347 / Angielski / Twarda / 2003 / 360 str. Termin realizacji zamówienia: ok. 30 dni roboczych. When you hear the term "image management," do you think of making a good impression? Or taking good care of Impressionists? If the latter, this book is for you Vast collections of images exist in a wide range of organizations and institutions, and on the Internet. Some of these images are difficult to track down; others are just too large, too small, too valuable, or too fragile to access directly. In this introductory text to the field, Jorgensen describes the theoretical, empirical, and pragmatic underpinnings of storage and retrieval as they apply to a variety of visual formats.
When you hear the term "image management," do you think of making a good impression? Or taking good care of Impressionists? If the latter, this book i...
|
cena:
394,21 |
![]() |
Anti-Virus Tools and Techniques for Computer
ISBN: 9780815513643 / Angielski / Twarda / 1995 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "Anti-Virus Tools & Techniques for Computer".
"Anti-Virus Tools & Techniques for Computer".
|
cena:
98,50 |
![]() |
Emerging Trends in Database and Knowledge Based Machines: The Application of Parallel Architectures to Smart Information Systems
ISBN: 9780818665523 / Angielski / Miękka / 1995 / 316 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book illustrates important ways in which new parallel hardware is being used to improve the speed and usefulness of a variety of information systems. It contains thirteen original papers that survey the latest trends in performance enhancing architectures for smart information systems.
The machines featured in the text have been designed to support information systems ranging from relational databases to semantic networks and other artificial intelligence paradigms. In addition, many of the projects illustrated in the book contain generic architectural ideas that support... This book illustrates important ways in which new parallel hardware is being used to improve the speed and usefulness of a variety of information syst...
|
cena:
357,64 |
![]() |
Statistical Methods in Computer Security
ISBN: 9780824759391 / Angielski / Twarda / 2004 / 376 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field. This blue-ribbon reference discusses the most influential advancements in computer security policy, firewalls, and security issues related to passwords. It addresses crime and misconduct on the Internet, considers the development of infrastructures that may prevent breaches of security and law, and illustrates the vulnerability of networked computers to new virus attacks despite widespread deployment of antivirus software,...
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current appl...
|
cena:
837,70 |
![]() |
Building an Information Security Awareness Program
ISBN: 9780849301162 / Angielski / Miękka / 2001 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't know about them, or why they're important, or what can happen to them if they ignore them. The key, of course, is continuous awareness of the problems and the solutions.Building an Information Security Awareness Program addresses these concerns. A reference and self-study guide, it goes step-by-step...
In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. ...
|
cena:
517,41 |
![]() |
Computer Forensics: Evidence Collection and Management
ISBN: 9780849305610 / Angielski / Twarda / 2007 / 432 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.
The book is divided into two major parts for easy... Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit ...
|
cena:
492,71 |
![]() |
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks
ISBN: 9780849308888 / Angielski / Twarda / 2003 / 896 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
|
cena:
665,24 |
![]() |
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management
ISBN: 9780849311376 / Angielski / Miękka / 2001 / 312 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
|
cena:
492,71 |
![]() |
A Practical Guide to Security Engineering and Information Assurance
ISBN: 9780849311635 / Angielski / Twarda / 2001 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to...
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions ...
|
cena:
665,24 |
![]() |
Securing Windows Nt/2000: From Policies to Firewalls
ISBN: 9780849312618 / Angielski / Miękka / 2002 / 272 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The... In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
|
cena:
517,41 |
![]() |
Building a Global Information Assurance Program
ISBN: 9780849313684 / Angielski / Miękka / 2002 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised....
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often ...
|
cena:
591,32 |