• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5009

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Database Development and Management Lee Chao 9780849333187 Auerbach Publications
Database Development and Management

ISBN: 9780849333187 / Angielski / Twarda / 2005 / 607 str.

ISBN: 9780849333187/Angielski/Twarda/2005/607 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Lee Chao
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications.

Database Development and Management explains all aspects of database design, access, implementation, application development, and management, as well as data analysis for business intelligence. This self-contained text gives students hands-on projects required for professionally developing and managing databases. It provides detailed instruction via an easy-to-follow, step-by-step case-based...

Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both busine...
cena: 636,71

 Wireless Security Handbook Aaron E. Earle 9780849333781 Auerbach Publications
Wireless Security Handbook

ISBN: 9780849333781 / Angielski / Twarda / 2005 / 384 str.

ISBN: 9780849333781/Angielski/Twarda/2005/384 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Aaron E. Earle
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
cena: 710,17

 How to Achieve 27001 Certification: An Example of Applied Compliance Management Arnason, Sigurjon Thor 9780849336485 Auerbach Publications
How to Achieve 27001 Certification: An Example of Applied Compliance Management

ISBN: 9780849336485 / Angielski / Twarda / 2007 / 348 str.

ISBN: 9780849336485/Angielski/Twarda/2007/348 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Sigurjon Thor Arnason; Arnason Thor Arnason; Keith Willett
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
cena: 479,92

 Quantum Communications and Cryptography Alexander V. Sergienko 9780849336843 CRC Press
Quantum Communications and Cryptography

ISBN: 9780849336843 / Angielski / Twarda / 2005 / 248 str.

ISBN: 9780849336843/Angielski/Twarda/2005/248 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Alexander V. Sergienko
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
cena: 857,10

 The Transform and Data Compression Handbook Kamisetty Ramamohan Rao Pat Yip K. R. Rao 9780849336928 CRC Press
The Transform and Data Compression Handbook

ISBN: 9780849336928 / Angielski / Twarda / 2000 / 408 str.

ISBN: 9780849336928/Angielski/Twarda/2000/408 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kamisetty Ramamohan Rao; Pat Yip; K. R. Rao
Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and commercial products, such as DVD, videophone, digital camera, MP3, video-streaming and wireless PCS, would have been virtually impossible. Transforming the data to a frequency or other domain enables even more efficient compression. By illustrating this intimate link, The Transform and Data Compression Handbook serves as a much-needed handbook for a wide range of researchers and engineers.
The authors describe various discrete transforms and...
Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and comme...
cena: 1150,97

 Complete Guide to CISM Certification Thomas R. Peltier Justin Peltier 9780849353567 Auerbach Publications
Complete Guide to CISM Certification

ISBN: 9780849353567 / Angielski / Twarda / 2006 / 474 str.

ISBN: 9780849353567/Angielski/Twarda/2006/474 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Thomas R. Peltier; Justin Peltier
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
cena: 479,92

 Software Deployment, Updating, and Patching Bill Stackpole Patrick Hanrion Stackpole Stackpole 9780849358005 CRC
Software Deployment, Updating, and Patching

ISBN: 9780849358005 / Angielski / Twarda / 2007 / 424 str.

ISBN: 9780849358005/Angielski/Twarda/2007/424 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Bill Stackpole; Patrick Hanrion; Stackpole Stackpole

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations.

Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing...

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the...

cena: 661,20

 practical hacking techniques and countermeasures  Spivey, Mark D. 9780849370571 Auerbach Publications
practical hacking techniques and countermeasures

ISBN: 9780849370571 / Angielski / Miękka / 2006 / 737 str.

ISBN: 9780849370571/Angielski/Miękka/2006/737 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Mark D. Spivey
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
cena: 479,92

 Security in Sensor Networks Yang Xiao 9780849370588 Auerbach Publications
Security in Sensor Networks

ISBN: 9780849370588 / Angielski / Twarda / 2006 / 341 str.

ISBN: 9780849370588/Angielski/Twarda/2006/341 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Yang Xiao
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
cena: 636,71

 Information Security: Design, Implementation, Measurement, and Compliance Layton, Timothy P. 9780849370878 Auerbach Publications
Information Security: Design, Implementation, Measurement, and Compliance

ISBN: 9780849370878 / Angielski / Twarda / 2006 / 264 str.

ISBN: 9780849370878/Angielski/Twarda/2006/264 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Timothy P. Layton
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for...
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
cena: 612,21

 Multimedia Encryption and Authentication Techniques and Applications Borko Furht Darko Kirovski 9780849372124 Auerbach Publications
Multimedia Encryption and Authentication Techniques and Applications

ISBN: 9780849372124 / Angielski / Twarda / 2006 / 408 str.

ISBN: 9780849372124/Angielski/Twarda/2006/408 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Borko Furht; Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for...
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
cena: 636,71

 Multimedia Watermarking Techniques and Applications Borko Furht Darko Kirovski 9780849372131 Auerbach Publications
Multimedia Watermarking Techniques and Applications

ISBN: 9780849372131 / Angielski / Twarda / 2006 / 464 str.

ISBN: 9780849372131/Angielski/Twarda/2006/464 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Borko Furht; Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad...
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
cena: 612,21

 Information Security Management Handbook Harold F., Cissp Tipton Micki, Cissp Krause 9780849374951 Auerbach Publications
Information Security Management Handbook

ISBN: 9780849374951 / Angielski / Twarda / 2007 / 3280 str.

ISBN: 9780849374951/Angielski/Twarda/2007/3280 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Harold F. Tipton; Micki Krause
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
cena: 1224,44

 Securing Converged IP Networks Tyson Macaulay 9780849375804 Auerbach Publications
Securing Converged IP Networks

ISBN: 9780849375804 / Angielski / Twarda / 2006 / 280 str.

ISBN: 9780849375804/Angielski/Twarda/2006/280 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Tyson Macaulay
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
cena: 479,92

 Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao 9780849379215 Auerbach Publications
Security in Distributed, Grid, Mobile, and Pervasive Computing

ISBN: 9780849379215 / Angielski / Twarda / 2007 / 440 str.

ISBN: 9780849379215/Angielski/Twarda/2007/440 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Yang Xiao
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
cena: 406,47

 IT Security Governance Guidebook with Security Program Metrics on CD-ROM Fred Cohen 9780849384356 Auerbach Publications
IT Security Governance Guidebook with Security Program Metrics on CD-ROM

ISBN: 9780849384356 / Angielski / Twarda / 2006 / 189 str.

ISBN: 9780849384356/Angielski/Twarda/2006/189 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Fred Cohen
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
cena: 636,71

 Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks Peltier, Thomas 9780879302399 Backbeat Books
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks

ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str.

ISBN: 9780879302399/Angielski/Miękka/1991/176 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Thomas R. Peltier
cena: 479,92

 Cryptology: Machines, History and Methods B. Winkel, etc. 9780890063996 Artech House Publishers
Cryptology: Machines, History and Methods

ISBN: 9780890063996 / Angielski / Twarda / 1990 / 520 str.

ISBN: 9780890063996/Angielski/Twarda/1990/520 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
B. Winkel;etc.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
cena: 814,13

 Authentication Systems for Secure Networks Rolf Oppliger 9780890065105 Artech House Publishers
Authentication Systems for Secure Networks

ISBN: 9780890065105 / Angielski / Twarda / 1996 / 208 str.

ISBN: 9780890065105/Angielski/Twarda/1996/208 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rolf Oppliger
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing tr...
cena: 509,40

 Information Warfare Principles and Operations Edward Waltz 9780890065112 Artech House Publishers
Information Warfare Principles and Operations

ISBN: 9780890065112 / Angielski / Twarda / 1998 / 416 str.

ISBN: 9780890065112/Angielski/Twarda/1998/416 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward Waltz
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and ...
cena: 768,64

Podprzednia  7  8  9  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia