
ilość książek w kategorii: 5009
![]() |
Database Development and Management
ISBN: 9780849333187 / Angielski / Twarda / 2005 / 607 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications. Database Development and Management explains all aspects of database design, access, implementation, application development, and management, as well as data analysis for business intelligence. This self-contained text gives students hands-on projects required for professionally developing and managing databases. It provides detailed instruction via an easy-to-follow, step-by-step case-based...
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both busine...
|
cena:
636,71 |
![]() |
Wireless Security Handbook
ISBN: 9780849333781 / Angielski / Twarda / 2005 / 384 str. Termin realizacji zamówienia: ok. 22 dni roboczych. < P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
|
cena:
710,17 |
![]() |
How to Achieve 27001 Certification: An Example of Applied Compliance Management
ISBN: 9780849336485 / Angielski / Twarda / 2007 / 348 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
|
cena:
479,92 |
![]() |
Quantum Communications and Cryptography
ISBN: 9780849336843 / Angielski / Twarda / 2005 / 248 str. Termin realizacji zamówienia: ok. 22 dni roboczych. All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
|
cena:
857,10 |
![]() |
The Transform and Data Compression Handbook
ISBN: 9780849336928 / Angielski / Twarda / 2000 / 408 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and commercial products, such as DVD, videophone, digital camera, MP3, video-streaming and wireless PCS, would have been virtually impossible. Transforming the data to a frequency or other domain enables even more efficient compression. By illustrating this intimate link, The Transform and Data Compression Handbook serves as a much-needed handbook for a wide range of researchers and engineers.
The authors describe various discrete transforms and... Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and comme...
|
cena:
1150,97 |
![]() |
Complete Guide to CISM Certification
ISBN: 9780849353567 / Angielski / Twarda / 2006 / 474 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
|
cena:
479,92 |
![]() |
Software Deployment, Updating, and Patching
ISBN: 9780849358005 / Angielski / Twarda / 2007 / 424 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing... The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the... |
cena:
661,20 |
![]() |
practical hacking techniques and countermeasures
ISBN: 9780849370571 / Angielski / Miękka / 2006 / 737 str. Termin realizacji zamówienia: ok. 22 dni roboczych. < P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
|
cena:
479,92 |
![]() |
Security in Sensor Networks
ISBN: 9780849370588 / Angielski / Twarda / 2006 / 341 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
|
cena:
636,71 |
![]() |
Information Security: Design, Implementation, Measurement, and Compliance
ISBN: 9780849370878 / Angielski / Twarda / 2006 / 264 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for... Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
|
cena:
612,21 |
![]() |
Multimedia Encryption and Authentication Techniques and Applications
ISBN: 9780849372124 / Angielski / Twarda / 2006 / 408 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
cena:
636,71 |
![]() |
Multimedia Watermarking Techniques and Applications
ISBN: 9780849372131 / Angielski / Twarda / 2006 / 464 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
cena:
612,21 |
![]() |
Information Security Management Handbook
ISBN: 9780849374951 / Angielski / Twarda / 2007 / 3280 str. Termin realizacji zamówienia: ok. 22 dni roboczych. A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
|
cena:
1224,44 |
![]() |
Securing Converged IP Networks
ISBN: 9780849375804 / Angielski / Twarda / 2006 / 280 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of... Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
|
cena:
479,92 |
![]() |
Security in Distributed, Grid, Mobile, and Pervasive Computing
ISBN: 9780849379215 / Angielski / Twarda / 2007 / 440 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
|
cena:
406,47 |
![]() |
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
ISBN: 9780849384356 / Angielski / Twarda / 2006 / 189 str. Termin realizacji zamówienia: ok. 22 dni roboczych. The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
|
cena:
636,71 |
![]() |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str. Termin realizacji zamówienia: ok. 22 dni roboczych. |
cena:
479,92 |
![]() |
Cryptology: Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 1990 / 520 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
|
cena:
814,13 |
![]() |
Authentication Systems for Secure Networks
ISBN: 9780890065105 / Angielski / Twarda / 1996 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing tr...
|
cena:
509,40 |
![]() |
Information Warfare Principles and Operations
ISBN: 9780890065112 / Angielski / Twarda / 1998 / 416 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and ...
|
cena:
768,64 |