• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 40 złBezpłatna dostawa dla zamówień powyżej 40 zł

Kategorie główne

• Nauka
 [3084275]
• Literatura piękna
 [1809953]
• Turystyka
 [52027]
• Informatyka
 [156199]
• Komiksy
 [35973]
• Encyklopedie
 [23064]
• Dziecięca
 [610142]
• Hobby
 [103153]
• AudioBooki
 [1529]
• Literatura faktu
 [194613]
• Muzyka CD
 [277]
• Słowniki
 [2941]
• Inne
 [440174]
• Kalendarze
 [453]
• Podręczniki
 [165831]
• Poradniki
 [420511]
• Religia
 [508205]
• Czasopisma
 [470]
• Sport
 [61077]
• Sztuka
 [248418]
• CD, DVD, Video
 [3355]
• Technologie
 [230839]
• Zdrowie
 [98323]
• Książkowe Klimaty
 [126]
• Zabawki
 [2511]
• Puzzle, gry
 [3464]
• Literatura w języku ukraińskim
 [272]
• Art. papiernicze i szkolne
 [6677]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5130

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


Software Deployment, Updating, and Patching Bill Stackpole Patrick Hanrion Stackpole Stackpole 9780849358005 CRC
Software Deployment, Updating, and Patching

ISBN: 9780849358005 / Angielski / Twarda / 2007 / 424 str.

ISBN: 9780849358005/Angielski/Twarda/2007/424 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bill Stackpole; Patrick Hanrion; Stackpole Stackpole

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations.

Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing...

The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the...

cena: 714,51

practical hacking techniques and countermeasures  Spivey, Mark D. 9780849370571 Auerbach Publications
practical hacking techniques and countermeasures

ISBN: 9780849370571 / Angielski / Miękka / 2006 / 737 str.

ISBN: 9780849370571/Angielski/Miękka/2006/737 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mark D. Spivey
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
cena: 517,41

Security in Sensor Networks Yang Xiao 9780849370588 Auerbach Publications
Security in Sensor Networks

ISBN: 9780849370588 / Angielski / Twarda / 2006 / 341 str.

ISBN: 9780849370588/Angielski/Twarda/2006/341 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Yang Xiao
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
cena: 689,87

Information Security: Design, Implementation, Measurement, and Compliance Layton, Timothy P. 9780849370878 Auerbach Publications
Information Security: Design, Implementation, Measurement, and Compliance

ISBN: 9780849370878 / Angielski / Twarda / 2006 / 264 str.

ISBN: 9780849370878/Angielski/Twarda/2006/264 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Timothy P. Layton
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for...
Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
cena: 665,24

Multimedia Encryption and Authentication Techniques and Applications Borko Furht Darko Kirovski 9780849372124 Auerbach Publications
Multimedia Encryption and Authentication Techniques and Applications

ISBN: 9780849372124 / Angielski / Twarda / 2006 / 408 str.

ISBN: 9780849372124/Angielski/Twarda/2006/408 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Borko Furht; Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for...
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
cena: 689,87

Multimedia Watermarking Techniques and Applications Borko Furht Darko Kirovski 9780849372131 Auerbach Publications
Multimedia Watermarking Techniques and Applications

ISBN: 9780849372131 / Angielski / Twarda / 2006 / 464 str.

ISBN: 9780849372131/Angielski/Twarda/2006/464 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Borko Furht; Darko Kirovski
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad...
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
cena: 665,24

Information Security Management Handbook Harold F., Cissp Tipton Micki, Cissp Krause 9780849374951 Auerbach Publications
Information Security Management Handbook

ISBN: 9780849374951 / Angielski / Twarda / 2007 / 3280 str.

ISBN: 9780849374951/Angielski/Twarda/2007/3280 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Harold F. Tipton; Micki Krause
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
cena: 4508,81

Securing Converged IP Networks Tyson Macaulay 9780849375804 Auerbach Publications
Securing Converged IP Networks

ISBN: 9780849375804 / Angielski / Twarda / 2006 / 280 str.

ISBN: 9780849375804/Angielski/Twarda/2006/280 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tyson Macaulay
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of...
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
cena: 517,41

Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao 9780849379215 Auerbach Publications
Security in Distributed, Grid, Mobile, and Pervasive Computing

ISBN: 9780849379215 / Angielski / Twarda / 2007 / 440 str.

ISBN: 9780849379215/Angielski/Twarda/2007/440 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Yang Xiao
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
cena: 433,59

IT Security Governance Guidebook with Security Program Metrics on CD-ROM Fred Cohen 9780849384356 Auerbach Publications
IT Security Governance Guidebook with Security Program Metrics on CD-ROM

ISBN: 9780849384356 / Angielski / Twarda / 2006 / 189 str.

ISBN: 9780849384356/Angielski/Twarda/2006/189 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Fred Cohen
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
cena: 689,87

Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks Peltier, Thomas 9780879302399 Backbeat Books
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks

ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str.

ISBN: 9780879302399/Angielski/Miękka/1991/176 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Thomas R. Peltier
cena: 517,41

Cryptology: Machines, History and Methods B. Winkel, etc. 9780890063996 Artech House Publishers
Cryptology: Machines, History and Methods

ISBN: 9780890063996 / Angielski / Twarda / 1990 / 520 str.

ISBN: 9780890063996/Angielski/Twarda/1990/520 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
B. Winkel;etc.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
cena: 818,60

Authentication Systems for Secure Networks Rolf Oppliger 9780890065105 Artech House Publishers
Authentication Systems for Secure Networks

ISBN: 9780890065105 / Angielski / Twarda / 1996 / 208 str.

ISBN: 9780890065105/Angielski/Twarda/1996/208 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rolf Oppliger
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing tr...
cena: 512,19

Information Warfare Principles and Operations Edward Waltz 9780890065112 Artech House Publishers
Information Warfare Principles and Operations

ISBN: 9780890065112 / Angielski / Twarda / 1998 / 416 str.

ISBN: 9780890065112/Angielski/Twarda/1998/416 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward Waltz
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and ...
cena: 772,86

Computerized Document Imaging Systems: Technology and Applications Nathan J. Muller 9780890066614 Artech House Publishers
Computerized Document Imaging Systems: Technology and Applications

ISBN: 9780890066614 / Angielski / Twarda / 1993 / 328 str.

ISBN: 9780890066614/Angielski/Twarda/1993/328 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nathan J. Muller
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory informat...
cena: 708,84

Secure Data Networking Michael Purser 9780890066928 Artech House Publishers
Secure Data Networking

ISBN: 9780890066928 / Angielski / Twarda / 1993 / 252 str.

ISBN: 9780890066928/Angielski/Twarda/1993/252 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Purser
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
cena: 571,65

Data Quality for the Information Age Thomas C. Redman, Ph.D. 9780890068830 Artech House Publishers
Data Quality for the Information Age

ISBN: 9780890068830 / Angielski / Twarda / 1997 / 332 str.

ISBN: 9780890068830/Angielski/Twarda/1997/332 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ph.D. Thomas C. Redman
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potential solutions and how they are combined to form an overall data quality program, senior management's role, methods used to make improvements, and the life-cycle of data quality. It concludes with case studies, summaries of main points, roles and responsibilities for each individual, and a helpful listing of "dos and don'ts."
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potenti...
cena: 361,28

Smart Card Security and Applications Mike Hendry 9780890069530 Artech House Publishers
Smart Card Security and Applications

ISBN: 9780890069530 / Angielski / Twarda / 1997 / 308 str.

ISBN: 9780890069530/Angielski/Twarda/1997/308 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Hendry
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
cena: 567,07

B-Trees for BASIC Ray Robertson 9780894960086 Ross Books
B-Trees for BASIC

ISBN: 9780894960086 / Angielski / Miękka / 1992 / 260 str.

ISBN: 9780894960086/Angielski/Miękka/1992/260 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ray Robertson
cena: 86,73

The Openbsd Pf Packet Filter Book Reed, Jeremy C. 9780979034206 Reed Media Services
The Openbsd Pf Packet Filter Book

ISBN: 9780979034206 / Angielski / Miękka / 2006 / 183 str.

ISBN: 9780979034206/Angielski/Miękka/2006/183 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jeremy C. Reed
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF FAQ with sections covering Spamd and configuring and using PF on NetBSD, FreeBSD, DragonFly and OpenBSD. The cross-referenced and indexed book also covers quality of service and ALTQ, load balancing, FTP proxying, stateful packet filtering, network address translation (NAT), port forwarding, passive operating system fingerprinting, and redundant firewalls (using pfsync and CARP). The OpenBSD PF Packet Filter Book includes several examples and...
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF ...
cena: 113,37

Podprzednia  7  8  9  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia