ilość książek w kategorii: 3855
Cryptology: Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 1990 / 520 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
|
|
cena:
925,95 zł |
Authentication Systems for Secure Networks
ISBN: 9780890065105 / Angielski / Twarda / 1996 / 208 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing traditional passwords for computer security. Describes and compares the systems currently available, including Kerberos, NetSP, SPX, TESS, and SESAME. A
For computer scientists, electrical engineers, and network specialists, explains the authentication and key distribution systems that are replacing tr...
|
|
cena:
579,37 zł |
Information Warfare Principles and Operations
ISBN: 9780890065112 / Angielski / Twarda / 1998 / 416 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and military information systems, and shows how these threats can be identified and systems protected.
A systems engineering-level introduction to the field of Information Warfare (IW), this text provides an overview of threats to commercial, civil and ...
|
|
cena:
874,23 zł |
Computerized Document Imaging Systems: Technology and Applications
ISBN: 9780890066614 / Angielski / Twarda / 1993 / 328 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory informat...
|
|
cena:
801,80 zł |
Secure Data Networking
ISBN: 9780890066928 / Angielski / Twarda / 1993 / 252 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, and uniqueness mechanisms.
This guide helps you protect networks from unauthorized access. It discusses counter security threats, optimum use of encryption, integrity checks, an...
|
|
cena:
646,62 zł |
Data Quality for the Information Age
ISBN: 9780890068830 / Angielski / Twarda / 1997 / 332 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potential solutions and how they are combined to form an overall data quality program, senior management's role, methods used to make improvements, and the life-cycle of data quality. It concludes with case studies, summaries of main points, roles and responsibilities for each individual, and a helpful listing of "dos and don'ts."
This informative book goes beyond the technical aspects of data management to provide detailed analyses of quality problems and their impacts, potenti...
|
|
cena:
408,66 zł |
Smart Card Security and Applications
ISBN: 9780890069530 / Angielski / Twarda / 1997 / 308 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals...
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, ...
|
|
cena:
641,45 zł |
B-Trees for BASIC
ISBN: 9780894960086 / Angielski / Miękka / 1992 / 260 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
97,28 zł |
Information Security and Auditing in the Digital Age
ISBN: 9780972741477 / Angielski / Miękka / 2003 / 548 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
243,64 zł |
The Openbsd Pf Packet Filter Book
ISBN: 9780979034206 / Angielski / Miękka / 2006 / 183 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF FAQ with sections covering Spamd and configuring and using PF on NetBSD, FreeBSD, DragonFly and OpenBSD. The cross-referenced and indexed book also covers quality of service and ALTQ, load balancing, FTP proxying, stateful packet filtering, network address translation (NAT), port forwarding, passive operating system fingerprinting, and redundant firewalls (using pfsync and CARP). The OpenBSD PF Packet Filter Book includes several examples and...
The OpenBSD PF Packet Filter Book covers PF on the NetBSD, FreeBSD, DragonFly and OpenBSD platforms. It is an expanded and improved version of the PF ...
|
|
cena:
127,41 zł |
The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology
ISBN: 9781402078897 / Angielski / Twarda / 2004 / 411 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an essential addition to an information security library. As such it should also serve the purpose of being a quick refresher for terms the reader has not seen since the days when one attended a computing science program, information security course or workshop. As a reference work, THE INFORMATION SECURITY DICTIONARY provides a relatively complete and easy-to-read explanation of common se- rity, malware, vulnerability and infrastructure protection...
Something for Everyone If this book is to succeed and help readers, its cardinal virtue must be to provide a simple reference text. It should be an es...
|
|
cena:
660,19 zł |
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing
ISBN: 9781410792327 / Angielski / Miękka / 2003 / 396 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
201,48 zł |
Breaking the Availability Barrier: Survivable Systems for Enterprise Computing
ISBN: 9781410792334 / Angielski / Twarda / 2003 / 396 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
253,22 zł |
The Abilene Net
ISBN: 9781418442262 / Angielski / Miękka / 2004 / 244 str. Termin realizacji zamówienia: ok. 13-18 dni roboczych (Dostawa przed świętami) |
|
cena:
90,53 zł |
Insider Computer Fraud: An In-Depth Framework for Detecting and Defending Against Insider It Attacks
ISBN: 9781420046595 / Angielski / Twarda / 2007 / 504 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regarding the company and its customers. This makes employees prime candidates for sabotaging a system if they become disgruntled or for selling privileged information if they become greedy. Insider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks presents the methods, safeguards, and techniques that help protect an organization from insider computer fraud.
Drawing from the author s vast experience... An organization s employees are often more intimate with its computer system than anyone else. Many also have access to sensitive information regardin...
|
|
cena:
627,23 zł |
Digital Privacy: Theory, Technologies, and Practices
ISBN: 9781420052176 / Angielski / Twarda / 2007 / 492 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although the availability of personal information has created several advantages, it can be easily misused and may lead to violations of privacy. With growing interest in this area, Digital Privacy: Theory, Technologies, and Practices addresses this timely issue, providing information on state-of-the-art technologies, best practices, and research results, as well as legal, regulatory, and ethical issues. This book features contributions from experts in...
During recent years, a continuously increasing amount of personal data has been made available through different websites around the world. Although t...
|
|
cena:
627,23 zł |
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
ISBN: 9781420052190 / Angielski / Twarda / 2007 / 760 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting in an in-depth yet accessible manner.
Introducing key concepts, this reference outlines the process of controlled access to resources through authentication, authorization, and accounting ...
|
|
cena:
627,23 zł |
Information Security Management Metrics: A Definitive Guide to Effective Security Monitoring and Measurement
ISBN: 9781420052855 / Angielski / Twarda / 2009 / 200 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this book presents case studies and tools for monitoring specific items, and offers practical guidance for implementing metrics across an entire organization.
Offering a step-by-step approach to developing and implementing relevant security metrics that are essential for effective security management, this b...
|
|
cena:
418,10 zł |
Data-Driven Block Ciphers for Fast Telecommunication Systems
ISBN: 9781420054118 / Angielski / Twarda / 2007 / 208 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Most Progressive and Complete Guide to DDO-Based Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.... The Most Progressive and Complete Guide to DDO-Based Ciphers
Developers have long recognized that ciphers based on Permutation Networks (PNs) and C... |
|
cena:
627,23 zł |
Building an Effective Information Security Policy Architecture
ISBN: 9781420059052 / Angielski / Twarda / 2008 / 368 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks. In order for these safeguards and controls to be effective, they must suit the particular business needs of the enterprise.
A guide for security professionals, Building an Effective Information Security Policy Architecture explains how to review, develop, and implement a security architecture for any size enterprise, whether it is a global company or a SMB. Through the use of questionnaires and interviews, the book... Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant ...
|
|
cena:
679,50 zł |