
ilość książek w kategorii: 5130
![]() |
Software Deployment, Updating, and Patching
ISBN: 9780849358005 / Angielski / Twarda / 2007 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing... The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the... |
cena:
714,51 |
![]() |
practical hacking techniques and countermeasures
ISBN: 9780849370571 / Angielski / Miękka / 2006 / 737 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. < P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
|
cena:
517,41 |
![]() |
Security in Sensor Networks
ISBN: 9780849370588 / Angielski / Twarda / 2006 / 341 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
|
cena:
689,87 |
![]() |
Information Security: Design, Implementation, Measurement, and Compliance
ISBN: 9780849370878 / Angielski / Twarda / 2006 / 264 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for... Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
|
cena:
665,24 |
![]() |
Multimedia Encryption and Authentication Techniques and Applications
ISBN: 9780849372124 / Angielski / Twarda / 2006 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
cena:
689,87 |
![]() |
Multimedia Watermarking Techniques and Applications
ISBN: 9780849372131 / Angielski / Twarda / 2006 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
cena:
665,24 |
![]() |
Information Security Management Handbook
ISBN: 9780849374951 / Angielski / Twarda / 2007 / 3280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
|
cena:
4508,81 |
![]() |
Securing Converged IP Networks
ISBN: 9780849375804 / Angielski / Twarda / 2006 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of... Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
|
cena:
517,41 |
![]() |
Security in Distributed, Grid, Mobile, and Pervasive Computing
ISBN: 9780849379215 / Angielski / Twarda / 2007 / 440 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
|
cena:
433,59 |
![]() |
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
ISBN: 9780849384356 / Angielski / Twarda / 2006 / 189 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
|
cena:
689,87 |
![]() |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
517,41 |
![]() |
Cryptology: Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 1990 / 520 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
|
cena:
818,60 |
![]() |
Authentication Systems for Secure Networks
ISBN: 9780890065105 / Angielski / Twarda / 1996 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing tr...
|
cena:
512,19 |
![]() |
Information Warfare Principles and Operations
ISBN: 9780890065112 / Angielski / Twarda / 1998 / 416 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and ...
|
cena:
772,86 |
![]() |
Computerized Document Imaging Systems: Technology and Applications
ISBN: 9780890066614 / Angielski / Twarda / 1993 / 328 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory informat...
|
cena:
708,84 |
![]() |
Secure Data Networking
ISBN: 9780890066928 / Angielski / Twarda / 1993 / 252 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
|
cena:
571,65 |
![]() |
Data Quality for the Information Age
ISBN: 9780890068830 / Angielski / Twarda / 1997 / 332 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potential solutions and how they are combined to form an overall data quality program, senior management's role, methods used to make improvements, and the life-cycle of data quality. It concludes with case studies, summaries of main points, roles and responsibilities for each individual, and a helpful listing of "dos and don'ts."
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potenti...
|
cena:
361,28 |
![]() |
Smart Card Security and Applications
ISBN: 9780890069530 / Angielski / Twarda / 1997 / 308 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
|
cena:
567,07 |
![]() |
B-Trees for BASIC
ISBN: 9780894960086 / Angielski / Miękka / 1992 / 260 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
86,73 |
![]() |
The Openbsd Pf Packet Filter Book
ISBN: 9780979034206 / Angielski / Miękka / 2006 / 183 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF FAQ with sections covering Spamd and configuring and using PF on NetBSD, FreeBSD, DragonFly and OpenBSD. The cross-referenced and indexed book also covers quality of service and ALTQ, load balancing, FTP proxying, stateful packet filtering, network address translation (NAT), port forwarding, passive operating system fingerprinting, and redundant firewalls (using pfsync and CARP). The OpenBSD PF Packet Filter Book includes several examples and...
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF ...
|
cena:
113,37 |