• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084275]
• Literatura piękna
 [1809953]
• Turystyka
 [52027]
• Informatyka
 [156199]
• Komiksy
 [35973]
• Encyklopedie
 [23064]
• Dziecięca
 [610142]
• Hobby
 [103153]
• AudioBooki
 [1529]
• Literatura faktu
 [194613]
• Muzyka CD
 [277]
• Słowniki
 [2941]
• Inne
 [440174]
• Kalendarze
 [453]
• Podręczniki
 [165831]
• Poradniki
 [420511]
• Religia
 [508205]
• Czasopisma
 [470]
• Sport
 [61077]
• Sztuka
 [248418]
• CD, DVD, Video
 [3355]
• Technologie
 [230839]
• Zdrowie
 [98323]
• Książkowe Klimaty
 [126]
• Zabawki
 [2511]
• Puzzle, gry
 [3464]
• Literatura w języku ukraińskim
 [272]
• Art. papiernicze i szkolne
 [6677]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5132

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Using the Common Criteria for IT Security Evaluation Debra S. Herrmann 9780849314049 Auerbach Publications
Using the Common Criteria for IT Security Evaluation

ISBN: 9780849314049 / Angielski / Miękka / 2002 / 304 str.

ISBN: 9780849314049/Angielski/Miękka/2002/304 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Debra S. Herrmann
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC evaluated IT security products in critical infrastructure systems. This standard provides a comprehensive methodology for specifying, implementing, and evaluating the security of IT products, systems, and networks. Because the Common Criteria (CC) for IT Security Evaluation is a relatively new...
Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology i...
cena: 640,59

Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition Killmeyer, Jan 9780849315497 Auerbach Publications
Information Security Architecture: An Integrated Approach to Security in the Organization, Second Edition

ISBN: 9780849315497 / Angielski / Twarda / 2006 / 424 str.

ISBN: 9780849315497/Angielski/Twarda/2006/424 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jan Killmeyer Tudor
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available.
In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight...
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security...
cena: 665,24

The Ethical Hack: A Framework for Business Value Penetration Testing Tiller, James S. 9780849316098 Auerbach Publications
The Ethical Hack: A Framework for Business Value Penetration Testing

ISBN: 9780849316098 / Angielski / Twarda / 2004 / 356 str.

ISBN: 9780849316098/Angielski/Twarda/2004/356 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
James S. Tiller; Tiller S. Tiller
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.The Ethical Hack: A Framework for Business Value...
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered f...
cena: 665,24

Network Perimeter Security: Building Defense In-Depth Riggs, Cliff 9780849316289 Auerbach Publications
Network Perimeter Security: Building Defense In-Depth

ISBN: 9780849316289 / Angielski / Twarda / 2003 / 420 str.

ISBN: 9780849316289/Angielski/Twarda/2003/420 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Cliff Riggs
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec experts. Oftentimes quick, temporary security fixes are the most that can be expected. The majority of security books on the market are also of little help. They are either targeted toward individuals pursuing security certifications or toward those interested in hacker methods. These overly detailed volumes fail to deliver the easily referenced tactical information needed to provide maximum security within the constraints of time...
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-t...
cena: 665,24

Information Security Policies and Procedures: A Practitioner's Reference, Second Edition Peltier, Thomas R. 9780849319587 Auerbach Publications
Information Security Policies and Procedures: A Practitioner's Reference, Second Edition

ISBN: 9780849319587 / Angielski / Twarda / 2004 / 408 str.

ISBN: 9780849319587/Angielski/Twarda/2004/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas R. Peltier; Peltier R. Peltier
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the efficient running of an organization. This book is divided into two parts, an overview of security policies and procedures, and an information security reference guide. This volume points out how security documents and standards are key elements in the business process that should never be undertaken to satisfy a perceived audit or security requirement. Instead, policies, standards, and procedures should exist only to support business objectives...
Information Security Policies and Procedures: A Practitioner s Reference, Second Edition illustrates how policies and procedures support the ef...
cena: 665,24

Strategic Information Security John Wylder 9780849320415 Auerbach Publications
Strategic Information Security

ISBN: 9780849320415 / Angielski / Twarda / 2003 / 240 str.

ISBN: 9780849320415/Angielski/Twarda/2003/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John Wylder
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies. Until now, however, most books about strategy and planning have focused on the production side of the business, rather than operations.Strategic Information Security integrates the importance of sound security policy with the strategic goals of an...
The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain t...
cena: 517,41

Database and Applications Security: Integrating Information Security and Data Management Thuraisingham, Bhavani 9780849322242 Auerbach Publications
Database and Applications Security: Integrating Information Security and Data Management

ISBN: 9780849322242 / Angielski / Twarda / 2005 / 656 str.

ISBN: 9780849322242/Angielski/Twarda/2005/656 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Miguel J. Bagajewicz; Bhavani M. Thuraisingham
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing.
Divided into eight sections, each of which focuses on a key concept of secure databases and applications, this book deals with all aspects of technology, including secure relational databases, inference problems, secure object databases, secure distributed databases and...
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
cena: 665,24

Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks Brooks, R. R. 9780849322723 CRC Press
Disruptive Security Technologies with Mobile Code and Peer-To-Peer Networks

ISBN: 9780849322723 / Angielski / Twarda / 2004 / 400 str.

ISBN: 9780849322723/Angielski/Twarda/2004/400 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Richard R. Brooks; R. Brooks
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that can be used to create systems that overcome security attacks through adaptation as opposed to the earlier fortress mentality, and provides instruction on creating disruptive applications that are much more secure than in the past. The book provides a fundamental understanding of design principles, and provides a model explaining mobile code and the methods that can be used to design secure robust peer-to-peer networks. Also included are recent...
This reference on network security integrates material on mobile computing and peer-to-peer communications. The author presents the initial steps that...
cena: 788,42

Investigator's Guide to Steganography Gregory Kipper 9780849324338 Auerbach Publications
Investigator's Guide to Steganography

ISBN: 9780849324338 / Angielski / Twarda / 2003 / 240 str.

ISBN: 9780849324338/Angielski/Twarda/2003/240 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gregory Kipper
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography began and evolved from ancient times. It also looks at the workings of digital steganography and watermarking methods and tools on the Internet.
Looks at steganography, a form of hidden communication from its beginnings to modern uses. This book provides insight into how this steganography bega...
cena: 517,41

Multimedia Security Handbook Borko Furht Darko Kirovski Borivoje Furht 9780849327735 CRC Press
Multimedia Security Handbook

ISBN: 9780849327735 / Angielski / Twarda / 2004 / 832 str.

ISBN: 9780849327735/Angielski/Twarda/2004/832 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Borko Furht; Darko Kirovski; Borivoje Furht
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the...
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from pi...
cena: 1133,36

Curing the Patch Management Headache Felicia M. Wetter 9780849328541 Auerbach Publications
Curing the Patch Management Headache

ISBN: 9780849328541 / Angielski / Twarda / 2005 / 288 str.

ISBN: 9780849328541/Angielski/Twarda/2005/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Felicia M. Wetter
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining this process ensures that patches are deployed in an organized, staged manner, resulting in little or no slowdowns or downtime to network infrastructure. Until now, there were no technical books for companies to use as a starting point for deploying the process. Curing the Patch Management Headache responds to this demand by tying together all aspects of the subject into one easy-to-understand format that is applicable regardless of the operating...
A comprehensive security patch management process is one of the fundamental security requirements for any IT-dependent organization. Fully defining th...
cena: 640,59

Network Security Technologies Kwok T. Fung K. T. Fung 9780849330278 Auerbach Publications
Network Security Technologies

ISBN: 9780849330278 / Angielski / Twarda / 2004 / 296 str.

ISBN: 9780849330278/Angielski/Twarda/2004/296 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kwok T. Fung; K. T. Fung
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities,...
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables unde...
cena: 591,32

Enhancing Computer Security with Smart Technology V. Rao Vemuri 9780849330452 Auerbach Publications
Enhancing Computer Security with Smart Technology

ISBN: 9780849330452 / Angielski / Twarda / 2005 / 288 str.

ISBN: 9780849330452/Angielski/Twarda/2005/288 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
V. Rao Vemuri
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security.
A collection of tutorials that draw from a broad spectrum of viewpoints and...
Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a mac...
cena: 813,07

Wireless Crime and Forensic Investigation Gregory Kipper 9780849331886 Auerbach Publications
Wireless Crime and Forensic Investigation

ISBN: 9780849331886 / Angielski / Twarda / 2006 / 280 str.

ISBN: 9780849331886/Angielski/Twarda/2006/280 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gregory Kipper
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and...
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining ac...
cena: 517,41

Database Development and Management Lee Chao 9780849333187 Auerbach Publications
Database Development and Management

ISBN: 9780849333187 / Angielski / Twarda / 2005 / 607 str.

ISBN: 9780849333187/Angielski/Twarda/2005/607 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lee Chao
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications.

Database Development and Management explains all aspects of database design, access, implementation, application development, and management, as well as data analysis for business intelligence. This self-contained text gives students hands-on projects required for professionally developing and managing databases. It provides detailed instruction via an easy-to-follow, step-by-step case-based...

Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both busine...
cena: 689,87

Wireless Security Handbook Aaron E. Earle 9780849333781 Auerbach Publications
Wireless Security Handbook

ISBN: 9780849333781 / Angielski / Twarda / 2005 / 384 str.

ISBN: 9780849333781/Angielski/Twarda/2005/384 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Aaron E. Earle
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
cena: 763,79

How to Achieve 27001 Certification: An Example of Applied Compliance Management Arnason, Sigurjon Thor 9780849336485 Auerbach Publications
How to Achieve 27001 Certification: An Example of Applied Compliance Management

ISBN: 9780849336485 / Angielski / Twarda / 2007 / 348 str.

ISBN: 9780849336485/Angielski/Twarda/2007/348 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Sigurjon Thor Arnason; Arnason Thor Arnason; Keith Willett
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
cena: 517,41

Quantum Communications and Cryptography Alexander V. Sergienko 9780849336843 CRC Press
Quantum Communications and Cryptography

ISBN: 9780849336843 / Angielski / Twarda / 2005 / 248 str.

ISBN: 9780849336843/Angielski/Twarda/2005/248 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
cena: 911,62

The Transform and Data Compression Handbook Kamisetty Ramamohan Rao Pat Yip K. R. Rao 9780849336928 CRC Press
The Transform and Data Compression Handbook

ISBN: 9780849336928 / Angielski / Twarda / 2000 / 408 str.

ISBN: 9780849336928/Angielski/Twarda/2000/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kamisetty Ramamohan Rao; Pat Yip; K. R. Rao
Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and commercial products, such as DVD, videophone, digital camera, MP3, video-streaming and wireless PCS, would have been virtually impossible. Transforming the data to a frequency or other domain enables even more efficient compression. By illustrating this intimate link, The Transform and Data Compression Handbook serves as a much-needed handbook for a wide range of researchers and engineers.
The authors describe various discrete transforms and...
Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and comme...
cena: 1158,00

Complete Guide to CISM Certification Thomas R. Peltier Justin Peltier 9780849353567 Auerbach Publications
Complete Guide to CISM Certification

ISBN: 9780849353567 / Angielski / Twarda / 2006 / 474 str.

ISBN: 9780849353567/Angielski/Twarda/2006/474 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas R. Peltier; Justin Peltier
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
cena: 517,41

Podprzednia  4  5  6  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia