ilość książek w kategorii: 3855
Enhancing Computer Security with Smart Technology
ISBN: 9780849330452 / Angielski / Twarda / 2005 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a machine learning background, then introduces machine learning concepts to computer security professionals.
Realizing the massive scope of these subjects, the author concentrates on problems related to the detection of intrusions through the application of machine learning methods and on the practical algorithmic aspects of machine learning and its role in security. A collection of tutorials that draw from a broad spectrum of viewpoints and... Divided into two major parts, Enhancing Computer Security with Smart Technology introduces the problems of computer security to researchers with a mac...
|
|
cena:
784,04 zł |
Wireless Crime and Forensic Investigation
ISBN: 9780849331886 / Angielski / Twarda / 2006 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the key areas that must be understood and applied to proactively solve the wireless problem.
From short text messaging to war driving, Wireless Crime and Forensic Investigation explores all aspects of wireless technology, how it is used in daily life, and... Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining ac...
|
|
cena:
496,50 zł |
The Handbook of Physical Security System Testing
ISBN: 9780849331893 / Angielski Termin realizacji zamówienia: ok. 30 dni roboczych. In the past decade the security industry has had difficulty keeping up with technological advances and security needs. The Handbook of Physical Security System Testing is the authoritative and definitive book on every phase of test planning and execution. The book defines the best practices that apply from start to finish and contains test planning and management checklists, test documentation templates, and example test plan material. This handbook explains the roles of testing, shows its many significant benefits, and establishes a baseline of best practices for physical security testing... In the past decade the security industry has had difficulty keeping up with technological advances and security needs. The Handbook of Physical Sec... |
|
cena:
275,05 zł |
Database Development and Management
ISBN: 9780849333187 / Angielski / Twarda / 2005 / 607 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both business intelligence and Web-based applications. Database Development and Management explains all aspects of database design, access, implementation, application development, and management, as well as data analysis for business intelligence. This self-contained text gives students hands-on projects required for professionally developing and managing databases. It provides detailed instruction via an easy-to-follow, step-by-step case-based...
Today's database professionals must understand how to apply database systems to business processes and how to develop database systems for both busine...
|
|
cena:
627,23 zł |
Wireless Security Handbook
ISBN: 9780849333781 / Angielski / Twarda / 2005 / 384 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. < P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook...
< P> The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, in...
|
|
cena:
731,77 zł |
How to Achieve 27001 Certification: An Example of Applied Compliance Management
ISBN: 9780849336485 / Angielski / Twarda / 2007 / 348 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an understanding of information security management standards and support for those implementing the ISO 17799 standard to pass an audit. This book provides questions and answers to determine information security strengths and weaknesses with respect to the standard. It presents detailed, step-by-step information to plan implementation and help an organization prepare for audit and certification. It also includes a questionnaire to assess readiness for an...
Offering tips, strategies, and basic explanations, How to Achieve 27001 Certification: An Example of Applied Compliance Management provides an underst...
|
|
cena:
496,50 zł |
Quantum Communications and Cryptography
ISBN: 9780849336843 / Angielski / Twarda / 2005 / 248 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Because eavesdropping changes the physical nature of the information, users in a quantum exchange can easily detect eavesdroppers. This allows for totally secure random key distribution, a central requirement for use of the one-time pad. Since the one-time pad is theoretically proven to be undecipherable, quantum cryptography is the key to perfect...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics ...
|
|
cena:
862,44 zł |
The Transform and Data Compression Handbook
ISBN: 9780849336928 / Angielski / Twarda / 2000 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and commercial products, such as DVD, videophone, digital camera, MP3, video-streaming and wireless PCS, would have been virtually impossible. Transforming the data to a frequency or other domain enables even more efficient compression. By illustrating this intimate link, The Transform and Data Compression Handbook serves as a much-needed handbook for a wide range of researchers and engineers.
The authors describe various discrete transforms and... Data compression is one of the main contributing factors in the explosive growth in information technology. Without it, a number of consumer and comme...
|
|
cena:
1123,78 zł |
Complete Guide to CISM Certification
ISBN: 9780849353567 / Angielski / Twarda / 2006 / 474 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal...
Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, desi...
|
|
cena:
496,50 zł |
Software Deployment, Updating, and Patching
ISBN: 9780849358005 / Angielski / Twarda / 2007 / 424 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the most successful software launch for months. Preparing for the rigors of software deployment includes not just implementing change, but training employees, predicting and mitigating pitfalls, and managing expectations. Software Deployment, Updating, and Patching provides the skills you need to develop a comprehensive strategy for tracking and managing system configurations, as well as for updating and securing... The deployment of software patches can be just as challenging as building entirely new workstations. Training and support issues can haunt even the... |
|
cena:
679,50 zł |
practical hacking techniques and countermeasures
ISBN: 9780849370571 / Angielski / Miękka / 2006 / 737 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. < P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation...
< P> Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustra...
|
|
cena:
496,50 zł |
Security in Sensor Networks
ISBN: 9780849370588 / Angielski / Twarda / 2006 / 341 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers, educators, and practitioners in the field. Containing thirteen invited chapters from internationally recognized security experts, this volume details attacks, encryption, authentication, watermarking, key management, secure routing, and secure aggregation, location, and...
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These dif...
|
|
cena:
627,23 zł |
Information Security: Design, Implementation, Measurement, and Compliance
ISBN: 9780849370878 / Angielski / Twarda / 2006 / 264 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for... Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New secur...
|
|
cena:
627,23 zł |
Multimedia Encryption and Authentication Techniques and Applications
ISBN: 9780849372124 / Angielski / Twarda / 2006 / 408 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
|
cena:
627,23 zł |
Multimedia Watermarking Techniques and Applications
ISBN: 9780849372131 / Angielski / Twarda / 2006 / 464 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad... Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of pira...
|
|
cena:
627,23 zł |
Information Security Management Handbook
ISBN: 9780849374951 / Angielski / Twarda / 2007 / 3280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this updated handbook contains new information on identity management, intrusion detection, role-based networking, legislative and privacy requirements, compliance and governance, risk assessment and management, and forensics.
A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, this upd...
|
|
cena:
1254,46 zł |
Securing Converged IP Networks
ISBN: 9780849375804 / Angielski / Twarda / 2006 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more. Due to this convergence of content, IP networks are emerging as extremely vital infrastructure components, requiring greater awareness and better security and management.
Offering diverse perspectives from the world's leading experts on convergence, Securing Converged IP Networks illustrates how to maintain content integrity and network assurance. This book discusses the convergence market and the business drivers of... Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, me...
|
|
cena:
496,50 zł |
Security in Distributed, Grid, Mobile, and Pervasive Computing
ISBN: 9780849379215 / Angielski / Twarda / 2007 / 440 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications.
This rich and useful presentation of strategies for security issues covers each computing area in separate sections. With more and more vital informat...
|
|
cena:
433,78 zł |
IT Security Governance Guidebook with Security Program Metrics on CD-ROM
ISBN: 9780849384356 / Angielski / Twarda / 2006 / 189 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model...
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information prot...
|
|
cena:
627,23 zł |
Policies and Procedures for Data Security: A Complete Manual for Computer Systems and Networks
ISBN: 9780879302399 / Angielski / Miękka / 1991 / 176 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
|
cena:
496,50 zł |