• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5009

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Computerized Document Imaging Systems: Technology and Applications Nathan J. Muller 9780890066614 Artech House Publishers
Computerized Document Imaging Systems: Technology and Applications

ISBN: 9780890066614 / Angielski / Twarda / 1993 / 328 str.

ISBN: 9780890066614/Angielski/Twarda/1993/328 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nathan J. Muller
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory informat...
cena: 704,97

 Secure Data Networking Michael Purser 9780890066928 Artech House Publishers
Secure Data Networking

ISBN: 9780890066928 / Angielski / Twarda / 1993 / 252 str.

ISBN: 9780890066928/Angielski/Twarda/1993/252 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Purser
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
cena: 568,52

 Data Quality for the Information Age Thomas C. Redman, Ph.D. 9780890068830 Artech House Publishers
Data Quality for the Information Age

ISBN: 9780890068830 / Angielski / Twarda / 1997 / 332 str.

ISBN: 9780890068830/Angielski/Twarda/1997/332 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ph.D. Thomas C. Redman
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potential solutions and how they are combined to form an overall data quality program, senior management's role, methods used to make improvements, and the life-cycle of data quality. It concludes with case studies, summaries of main points, roles and responsibilities for each individual, and a helpful listing of "dos and don'ts."
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potenti...
cena: 359,31

 Smart Card Security and Applications Mike Hendry 9780890069530 Artech House Publishers
Smart Card Security and Applications

ISBN: 9780890069530 / Angielski / Twarda / 1997 / 308 str.

ISBN: 9780890069530/Angielski/Twarda/1997/308 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Mike Hendry
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
cena: 563,98

 B-Trees for BASIC Ray Robertson 9780894960086 Ross Books
B-Trees for BASIC

ISBN: 9780894960086 / Angielski / Miękka / 1992 / 260 str.

ISBN: 9780894960086/Angielski/Miękka/1992/260 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ray Robertson
cena: 86,30

 The Openbsd Pf Packet Filter Book Reed, Jeremy C. 9780979034206 Reed Media Services
The Openbsd Pf Packet Filter Book

ISBN: 9780979034206 / Angielski / Miękka / 2006 / 183 str.

ISBN: 9780979034206/Angielski/Miękka/2006/183 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Jeremy C. Reed
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF FAQ with sections covering Spamd and configuring and using PF on NetBSD, FreeBSD, DragonFly and OpenBSD. The cross-referenced and indexed book also covers quality of service and ALTQ, load balancing, FTP proxying, stateful packet filtering, network address translation (NAT), port forwarding, passive operating system fingerprinting, and redundant firewalls (using pfsync and CARP). The OpenBSD PF Packet Filter Book includes several examples and...
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF ...
cena: 112,78

 The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology Urs E. Gattiker 9781402078897 Kluwer Academic Publishers
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology

ISBN: 9781402078897 / Angielski / Twarda / 2004 / 411 str.

ISBN: 9781402078897/Angielski/Twarda/2004/411 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Urs E. Gattiker
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
cena: 618,61

 Breaking the Availability Barrier: Survivable Systems for Enterprise Computing Highleyman, Bill 9781410792327 Authorhouse
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing

ISBN: 9781410792327 / Angielski / Miękka / 2003 / 396 str.

ISBN: 9781410792327/Angielski/Miękka/2003/396 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bill Highleyman
cena: 177,16

 Breaking the Availability Barrier: Survivable Systems for Enterprise Computing Highleyman, Bill 9781410792334 Authorhouse
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing

ISBN: 9781410792334 / Angielski / Twarda / 2003 / 396 str.

ISBN: 9781410792334/Angielski/Twarda/2003/396 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Bill Highleyman
cena: 222,63

 The Abilene Net Gregg Powers 9781418442262 Authorhouse
The Abilene Net

ISBN: 9781418442262 / Angielski / Miękka / 2004 / 244 str.

ISBN: 9781418442262/Angielski/Miękka/2004/244 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gregg Powers
cena: 79,59

 Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks Brancik, Kenneth 9781420046595 Auerbach Publications
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks

ISBN: 9781420046595 / Angielski / Twarda / 2007 / 504 str.

ISBN: 9781420046595/Angielski/Twarda/2007/504 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Kenneth Brancik
An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.

Drawing from the author s vast experience...

An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regardin...
cena: 636,71

 Digital Privacy: Theory, Technologies, and Practices Acquisti, Alessandro 9781420052176 Auerbach Publications
Digital Privacy: Theory, Technologies, and Practices

ISBN: 9781420052176 / Angielski / Twarda / 2007 / 492 str.

ISBN: 9781420052176/Angielski/Twarda/2007/492 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Alessandro Acquisti; Sabrina Di Vimercati; Stefanos Gritzalis
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in...
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although t...
cena: 612,21

 Mechanics of User Identification and Authentication: Fundamentals of Identity Management Todorov, Dobromir 9781420052190 Auerbach Publications
Mechanics of User Identification and Authentication: Fundamentals of Identity Management

ISBN: 9781420052190 / Angielski / Twarda / 2007 / 760 str.

ISBN: 9781420052190/Angielski/Twarda/2007/760 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Dobromir Todorov
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth yet accessible manner.
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting ...
cena: 636,71

 Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement Brotby 9781420052855 Auerbach Publications
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement

ISBN: 9781420052855 / Angielski / Twarda / 2009 / 200 str.

ISBN: 9781420052855/Angielski/Twarda/2009/200 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
W. Krag Brotby
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this book presents case studies and tools for monitoring specific items, and offers practical guidance for implementing metrics across an entire organization.
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this b...
cena: 406,47

 Data-Driven Block Ciphers for Fast Telecommunication Systems Nikolai Moldovyan Alexander A. Moldovyan Nick Moldovyan 9781420054118 Auerbach Publications
Data-Driven Block Ciphers for Fast Telecommunication Systems

ISBN: 9781420054118 / Angielski / Twarda / 2007 / 208 str.

ISBN: 9781420054118/Angielski/Twarda/2007/208 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Nikolai Moldovyan; Alexander A. Moldovyan; Nick Moldovyan
The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts....

The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and C...

cena: 636,71

 Building an Effective Information Security Policy Architecture Sandy Bacik 9781420059052 CRC
Building an Effective Information Security Policy Architecture

ISBN: 9781420059052 / Angielski / Twarda / 2008 / 368 str.

ISBN: 9781420059052/Angielski/Twarda/2008/368 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Sandy Bacik
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise.

A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book...

Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant ...
cena: 661,20

 Handbook of Financial Cryptography and Security Burton Rosenberg 9781420059816 Chapman & Hall/CRC
Handbook of Financial Cryptography and Security

ISBN: 9781420059816 / Angielski / Twarda / 2010 / 631 str.

ISBN: 9781420059816/Angielski/Twarda/2010/631 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Burton Rosenberg

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment systems, digital rights, financial portfolios, routing networks, and more.

In the first part, the book examines blind signatures and other important cryptographic techniques with respect to digital cash/e-cash. It also looks at the role of cryptography in auctions and...

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to es...

cena: 710,17

 Encyclopedia of Information Assurance - 4 Volume Set (Print) Rebecca Herold Marcus K. Rogers 9781420066203 Auerbach Publications
Encyclopedia of Information Assurance - 4 Volume Set (Print)

ISBN: 9781420066203 / Angielski / Twarda / 2010 / 3860 str.

ISBN: 9781420066203/Angielski/Twarda/2010/3860 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Rebecca Herold; Marcus K. Rogers
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed...
Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) p...
cena: 6122,16

 Information Security Management Handbook, Volume 2 Harold F., Cissp Tipton Micki, Cissp Krause 9781420067088 Auerbach Publications
Information Security Management Handbook, Volume 2

ISBN: 9781420067088 / Angielski / Twarda / 2008 / 456 str.

ISBN: 9781420067088/Angielski/Twarda/2008/456 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Harold F. Tipton; Micki Krause
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Information Security, Volume 2 includes coverage of each domain of the Common Body of Knowledge, the standard of knowledge required by IT security professionals worldwide. In step with the lightening-quick, increasingly fast pace of change in the technology field, this book is updated annually, keeping IT...
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth ...
cena: 636,71

 Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet Dunham, Ken 9781420069037 Auerbach Publications
Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet

ISBN: 9781420069037 / Angielski / Twarda / 2008 / 168 str.

ISBN: 9781420069037/Angielski/Twarda/2008/168 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Ken Dunham; Jim Melnick
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats and how they function and examines the top bot attacks against financial and government networks.
Describes the scope, sophistication, and criminal uses of bots and how to more pro actively protect against them. This book introduces botnet threats ...
cena: 357,48

Podprzednia  7  8  9  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia