
ilość książek w kategorii: 5083
![]() |
Cybersecurity Awareness: Staying Safe Online
ISBN: 9798399284392 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,80 |
![]() |
Understanding AI Monitoring and the Future of Our Privacy: Invisible Eyes
ISBN: 9798344929255 / Angielski / Miękka / 2024 / 102 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,80 |
![]() |
Cybercrime, Cyberterrorism, and Cyberwarfare
ISBN: 9781441572172 / Angielski / Miękka / 2009 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
FIPS 140 Demystified: An Introductory Guide for Vendors
ISBN: 9781460990391 / Angielski / Miękka / 2011 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Internet to make online purchases. Corporations store financial and medical information. This data must be protected and encryption (or cryptographic technologies) is the last line of defense against unauthorized access to this precious information. The Federal Information Processing Standard 140 (FIPS 140) is an internationally-recognized standard for assessing and validating that the cryptographic technologies used in our computer systems and...
We all transmit and store sensitive and confidential electronic data in our everyday lives. Consumers send their credit card numbers across the Intern...
|
cena:
80,88 |
![]() |
The Four Pillars of Endpoint Security: Safeguarding Your Network in the Age of Cloud Computing and the Bring-Your-Own-Device Trend
ISBN: 9781475232707 / Angielski / Miękka / 2013 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data, from any mobile device. But IT managers are nervous about serving sensitive corporate data to devices that lack sophisticated security controls. By applying the Four Pillars of Endpoint Security, businesses can stay competitive and operate without interruption, which leads to higher productivity and business velocity.
Security is an advantage: the Bring-Your-Own-Device (BYOD) trend in enterprise IT has caused users to expect anywhere/anytime access to sensitive data...
|
cena:
80,88 |
![]() |
Cloud Security and Control
ISBN: 9781469992549 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some unique opportunities for organizations to use security as a business enabler. For example, many cloud technologies offer ready support for collaboration with partners and customers. Likewise, cloud services are being used by IT organizations to support mobile computing, the "bring your own device" trend, and the consumerization of IT. In all of those contexts, security technologies are an enabler.
In any technology domain, security has overhead and costs associated with it, and cloud computing is no different. But cloud computing offers some uni...
|
cena:
80,88 |
![]() |
The Zealots Guide To Computer Security 2013
ISBN: 9781484977248 / Angielski / Miękka / 2013 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network security and computer security practices that can thwart modern cyber crime from a variety of sources.
Enjoyed Top 10 Download Status In Its Genre On Kindle ***** A groundbreaking manual for the business owner. Covering all the aspects of network securi...
|
cena:
80,88 |
![]() |
The Zealots Guide To Linux Mint Special Edition
ISBN: 9781500273439 / Angielski / Miękka / 2014 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
GNU GSS Library: Generic Security Service
ISBN: 9789888381661 / Angielski / Miękka / 2015 / 78 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide security services, e.g., to authenticate SMTP/IMAP clients against SMTP/IMAP servers. GSS consists of a library and a manual. GSS is developed for the GNU/Linux system, but runs on over 20 platforms including most major Unix platforms and Windows, and many kind of devices including iPAQ handhelds and S/390 mainframes.
GSS is an implementation of the Generic Security Service Application Program Interface (GSS-API). GSS-API is used by network servers to provide securi...
|
cena:
80,88 |
![]() |
Walking Wounded: Inside the U.S. Cyberwar Machine
ISBN: 9781539945611 / Angielski / Miękka / 2016 / 232 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insider's journey through the secret history, technologies, and strategies surrounding war and espionage in cyberspace. Walking Wounded is not another hacking book. It takes the reader behind the scenes and recounts the story of the Pentagon's love affair with technology, and how this reliance makes them vulnerable to hackers. It explains how foreign intelligence services, criminals, and amateur hackers have compromised our sensitive systems for three...
Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insider's jou...
|
cena:
80,88 |
![]() |
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy
ISBN: 9786069836002 / Angielski / Miękka / 2018 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Understanding Your Responsibilities to Meet DOD NIST 800-171 (Gray Version): The Definitive Cybersecurity Contract Guide
ISBN: 9781980511847 / Angielski / Miękka / 2018 / 138 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
The little handbook of Windows Forensics: Just some random thoughts about Windows Forensics
ISBN: 9781730914102 / Angielski / Miękka / 2018 / 136 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Ultimate Hacking Challenge: Train on dedicated machines to master the art of hacking
ISBN: 9781521708477 / Angielski / Miękka / 2017 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Hacking Into Computer Systems: - A Beginners Guide
ISBN: 9781729097892 / Angielski / Miękka / 2018 / 222 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Cyber Security: Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security
ISBN: 9781075257674 / Angielski / Miękka / 2019 / 150 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Ethical Hacking: Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking
ISBN: 9781075273025 / Angielski / Miękka / 2019 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
ZFS on Linux: Internals and Administration
ISBN: 9781544622040 / Angielski / Miękka / 2017 / 112 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Kali Linux: Comprehensive Beginners Guide to Learn Kali Linux Step by Step
ISBN: 9781081560973 / Angielski / Miękka / 2019 / 164 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |
![]() |
Simple Internet Safety: The Knowledge You Need to Avoid Being Scammed
ISBN: 9781539748731 / Angielski / Miękka / 2016 / 40 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
80,88 |