• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5007

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computer Forensics: Evidence Collection and Management Newman, Robert C. 9780849305610 Auerbach Publications
Computer Forensics: Evidence Collection and Management

ISBN: 9780849305610 / Angielski / Twarda / 2007 / 432 str.

ISBN: 9780849305610/Angielski/Twarda/2007/432 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Robert C. Newman
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices. The book focuses on the numerous vulnerabilities and threats that are inherent on the Internet and networking environments and presents techniques and suggestions for corporate security personnel, investigators, and forensic examiners to successfully identify, retrieve, and protect valuable forensic evidence for litigation and prosecution.

The book is divided into two major parts for easy...

Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit ...
cena: 464,29

 The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks Young, Susan 9780849308888 Auerbach Publications
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

ISBN: 9780849308888 / Angielski / Twarda / 2003 / 896 str.

ISBN: 9780849308888/Angielski/Twarda/2003/896 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
J. Burke Hansen; Susan Young
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of...
The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing ...
cena: 610,97

 Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management Peltier, Thomas R. 9780849311376 Auerbach Publications
Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management

ISBN: 9780849311376 / Angielski / Miękka / 2001 / 312 str.

ISBN: 9780849311376/Angielski/Miękka/2001/312 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Thomas R. Peltier
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals....
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts a...
cena: 464,29

 A Practical Guide to Security Engineering and Information Assurance Debra S. Herrmann 9780849311635 Auerbach Publications
A Practical Guide to Security Engineering and Information Assurance

ISBN: 9780849311635 / Angielski / Twarda / 2001 / 408 str.

ISBN: 9780849311635/Angielski/Twarda/2001/408 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Debra S. Herrmann
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to...
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions ...
cena: 610,97

 Securing Windows Nt/2000: From Policies to Firewalls Simonyi, Michael A. 9780849312618 Auerbach Publications
Securing Windows Nt/2000: From Policies to Firewalls

ISBN: 9780849312618 / Angielski / Miękka / 2002 / 272 str.

ISBN: 9780849312618/Angielski/Miękka/2002/272 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Michael A. Simonyi
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large corporations require a massive dose of security to protect themselves and their digital assets from unwanted intruders. A managerial guide and practical technical tutorial, Securing Windows NT/2000: From Policies to Firewalls provides viable security solutions for your organization.
The author presents in-depth knowledge on how, why, and where these operating systems must be tuned in order to use them securely to connect to the Internet. The...
In today's business environment it is no longer safe to conduct any business on the Internet without first protecting it. Small, medium, and large cor...
cena: 478,95

 Building a Global Information Assurance Program John E. MacArthur Raymond J. Curts Douglas E. Campbell 9780849313684 Auerbach Publications
Building a Global Information Assurance Program

ISBN: 9780849313684 / Angielski / Miękka / 2002 / 424 str.

ISBN: 9780849313684/Angielski/Miękka/2002/424 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
John E. MacArthur; Raymond J. Curts; Douglas E. Campbell
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised....
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often ...
cena: 537,65

 Using the Common Criteria for IT Security Evaluation Debra S. Herrmann 9780849314049 Auerbach Publications
Using the Common Criteria for IT Security Evaluation

ISBN: 9780849314049 / Angielski / Miękka / 2002 / 304 str.

ISBN: 9780849314049/Angielski/Miękka/2002/304 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Debra S. Herrmann
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new...
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology i...
cena: 586,53

 Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Killmeyer, Jan 9780849315497 Auerbach Publications
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

ISBN: 9780849315497 / Angielski / Twarda / 2006 / 424 str.

ISBN: 9780849315497/Angielski/Twarda/2006/424 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Jan Killmeyer Tudor
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight...
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security...
cena: 610,97

 The Ethical Hack: A Framework for Business Value Penetration Testing Tiller, James S. 9780849316098 Auerbach Publications
The Ethical Hack: A Framework for Business Value Penetration Testing

ISBN: 9780849316098 / Angielski / Twarda / 2004 / 356 str.

ISBN: 9780849316098/Angielski/Twarda/2004/356 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
James S. Tiller; Tiller S. Tiller
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
cena: 610,97

 Network Perimeter Security: Building Defense In-Depth Riggs, Cliff 9780849316289 Auerbach Publications
Network Perimeter Security: Building Defense In-Depth

ISBN: 9780849316289 / Angielski / Twarda / 2003 / 420 str.

ISBN: 9780849316289/Angielski/Twarda/2003/420 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Cliff Riggs
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
cena: 610,97

 Information Security Policies and Procedures: A Practitioner's Reference, Second Edition Peltier, Thomas R. 9780849319587 Auerbach Publications
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

ISBN: 9780849319587 / Angielski / Twarda / 2004 / 408 str.

ISBN: 9780849319587/Angielski/Twarda/2004/408 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Thomas R. Peltier; Peltier R. Peltier
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
cena: 610,97

 Strategic Information Security John Wylder 9780849320415 Auerbach Publications
Strategic Information Security

ISBN: 9780849320415 / Angielski / Twarda / 2003 / 240 str.

ISBN: 9780849320415/Angielski/Twarda/2003/240 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
John Wylder
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.Strategic Information Security integrates the importance of sound security policy with the strategic goals of an...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain t...
cena: 478,95

 Database and Applications Security: Integrating Information Security and Data Management Thuraisingham, Bhavani 9780849322242 Auerbach Publications
Database and Applications Security: Integrating Information Security and Data Management

ISBN: 9780849322242 / Angielski / Twarda / 2005 / 656 str.

ISBN: 9780849322242/Angielski/Twarda/2005/656 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Miguel J. Bagajewicz; Bhavani M. Thuraisingham
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and...
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
cena: 610,97

 Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks Brooks, R. R. 9780849322723 CRC Press
Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks

ISBN: 9780849322723 / Angielski / Twarda / 2004 / 400 str.

ISBN: 9780849322723/Angielski/Twarda/2004/400 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Richard R. Brooks; R. Brooks
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent...
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that...
cena: 733,16

 Investigator's Guide to Steganography Gregory Kipper 9780849324338 Auerbach Publications
Investigator's Guide to Steganography

ISBN: 9780849324338 / Angielski / Twarda / 2003 / 240 str.

ISBN: 9780849324338/Angielski/Twarda/2003/240 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Gregory Kipper
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography bega...
cena: 478,95

 Multimedia Security Handbook Borko Furht Darko Kirovski Borivoje Furht 9780849327735 CRC Press
Multimedia Security Handbook

ISBN: 9780849327735 / Angielski / Twarda / 2004 / 832 str.

ISBN: 9780849327735/Angielski/Twarda/2004/832 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Borko Furht; Darko Kirovski; Borivoje Furht
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the...
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from pi...
cena: 1050,87

 Curing the Patch Management Headache Felicia M. Nicastro 9780849328541 Auerbach Publications
Curing the Patch Management Headache

ISBN: 9780849328541 / Angielski / Twarda / 2005 / 288 str.

ISBN: 9780849328541/Angielski/Twarda/2005/288 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Felicia M. Nicastro
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating...
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining th...
cena: 586,53

 Network Security Technologies Kwok T. Fung K. T. Fung 9780849330278 Auerbach Publications
Network Security Technologies

ISBN: 9780849330278 / Angielski / Twarda / 2004 / 296 str.

ISBN: 9780849330278/Angielski/Twarda/2004/296 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kwok T. Fung; K. T. Fung
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities,...
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables unde...
cena: 537,65

 Enhancing Computer Security with Smart Technology V. Rao Vemuri 9780849330452 Auerbach Publications
Enhancing Computer Security with Smart Technology

ISBN: 9780849330452 / Angielski / Twarda / 2005 / 288 str.

ISBN: 9780849330452/Angielski/Twarda/2005/288 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
V. Rao Vemuri
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.
A collection of tutorials that draw from a broad spectrum of viewpoints and...
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a mac...
cena: 757,61

 Wireless Crime and Forensic Investigation Gregory Kipper 9780849331886 Auerbach Publications
Wireless Crime and Forensic Investigation

ISBN: 9780849331886 / Angielski / Twarda / 2006 / 280 str.

ISBN: 9780849331886/Angielski/Twarda/2006/280 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Gregory Kipper
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and...
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining ac...
cena: 478,95

Podprzednia  4  5  6  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia