• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2939893]
• Literatura piękna
 [1808953]
• Turystyka
 [70366]
• Informatyka
 [150555]
• Komiksy
 [35137]
• Encyklopedie
 [23160]
• Dziecięca
 [608786]
• Hobby
 [136447]
• AudioBooki
 [1631]
• Literatura faktu
 [225099]
• Muzyka CD
 [360]
• Słowniki
 [2914]
• Inne
 [442115]
• Kalendarze
 [1068]
• Podręczniki
 [166599]
• Poradniki
 [468390]
• Religia
 [506548]
• Czasopisma
 [506]
• Sport
 [61109]
• Sztuka
 [241608]
• CD, DVD, Video
 [3308]
• Technologie
 [218981]
• Zdrowie
 [98614]
• Książkowe Klimaty
 [124]
• Zabawki
 [2174]
• Puzzle, gry
 [3275]
• Literatura w języku ukraińskim
 [260]
• Art. papiernicze i szkolne
 [7376]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5009

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Algorithmic Cryptanalysis Antoine Joux 9781420070026 Chapman & Hall/CRC
Algorithmic Cryptanalysis

ISBN: 9781420070026 / Angielski / Twarda / 2009 / 501 str.

ISBN: 9781420070026/Angielski/Twarda/2009/501 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Antoine Joux

Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard-Fourier-Walsh transforms, lattice reduction, and Grobner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He includes some hints and solutions to...

Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples...

cena: 710,17

 Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications Loza, Boris 9781420848243 Authorhouse
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications

ISBN: 9781420848243 / Angielski / Twarda / 2005 / 341 str.

ISBN: 9781420848243/Angielski/Twarda/2005/341 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Boris Loza
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," opera...
cena: 227,37

 Computer Security and Telerobotics for Everyone Eamon P. Dohert 9781420896824 Authorhouse
Computer Security and Telerobotics for Everyone

ISBN: 9781420896824 / Angielski / Miękka / 2005 / 179 str.

ISBN: 9781420896824/Angielski/Miękka/2005/179 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Eamon P. Doherty Ph. D.
cena: 83,43

 Windows Server 2003 Security Infrastructures: Core Security Features Jan De Clercq (Senior Consultant, HP Consulting and Integration, Hewlett-Packard Company, Belgium) 9781555582838 Elsevier Science & Technology
Windows Server 2003 Security Infrastructures: Core Security Features

ISBN: 9781555582838 / Angielski / Miękka / 2004 / 784 str.

ISBN: 9781555582838/Angielski/Miękka/2004/784 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
HP Consulting and Integrat Jan De Clercq (Senior Consultant
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS.

*Explains nuts and bolts of Windows Server...

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to l...
cena: 293,81

 Firewalls: Jumpstart for Network and Systems Administrators John R. Vacca (Technology Consultant, TechWrite, USA), Scott Ellis (Independent Consultant, Chicago, IL, U.S.A.) 9781555582975 Elsevier Science & Technology
Firewalls: Jumpstart for Network and Systems Administrators

ISBN: 9781555582975 / Angielski / Miękka / 2004 / 448 str.

ISBN: 9781555582975/Angielski/Miękka/2004/448 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
USA) TechWrite John R. Vacca (Technology Consultant; U.S.A.) IL Chicago Scott Ellis (Independent Consultant
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
cena: 288,92

 Internet Security: A Jumpstart for Systems Administrators and IT Managers Tim Speed (Lotus Consulting, Dallas, Texas, U.S.A.), Juanita Ellis (Consultant, Los Angeles, CA, USA) 9781555582982 Elsevier Science & Technology
Internet Security: A Jumpstart for Systems Administrators and IT Managers

ISBN: 9781555582982 / Angielski / Miękka / 2003 / 398 str.

ISBN: 9781555582982/Angielski/Miękka/2003/398 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
U.S.A.) Texas Dallas Tim Speed (Lotus Consulting; USA) CA Los Angeles Juanita Ellis (Consultant
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to...

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be ...
cena: 264,43

 Implementing Homeland Security for Enterprise IT Michael Erbschloe (Author, educator and security advisor, Washington, DC) 9781555583125 Elsevier Science & Technology
Implementing Homeland Security for Enterprise IT

ISBN: 9781555583125 / Angielski / Miękka / 2004 / 299 str.

ISBN: 9781555583125/Angielski/Miękka/2004/299 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Wa educator and security advisor Michael Erbschloe (Author
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001.

The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector...

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures...
cena: 249,73

 Physical Security for IT Michael Erbschloe (Author, educator and security advisor, Washington, DC) 9781555583279 Elsevier Science & Technology
Physical Security for IT

ISBN: 9781555583279 / Angielski / Miękka / 2004 / 256 str.

ISBN: 9781555583279/Angielski/Miękka/2004/256 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Wa educator and security advisor Michael Erbschloe (Author
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into...
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the vir...
cena: 259,53

 Voice over Internet Protocol (VoIP) Security James F. Ransome, PhD, CISM, CISSP (James F. Ransome, Ph.D., CISSP, CISM,SVP, Managed Security Services), John Rittingho 9781555583323 Elsevier Science & Technology
Voice over Internet Protocol (VoIP) Security

ISBN: 9781555583323 / Angielski / Miękka / 2004 / 432 str.

ISBN: 9781555583323/Angielski/Miękka/2004/432 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Ph.D. CISSP (James F. Ransome CISM PhD James F. Ransome; Professional Security Ser CISM (SVP PhD John Rittinghouse
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.

* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to...

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in...
cena: 254,64

 Implementing Database Security and Auditing Ron Ben Natan 9781555583347 Elsevier Science & Technology
Implementing Database Security and Auditing

ISBN: 9781555583347 / Angielski / Miękka / 2005 / 432 str.

ISBN: 9781555583347/Angielski/Miękka/2005/432 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Ron Ben Natan
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to...
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditin...
cena: 281,62

 IM Instant Messaging Security John Rittinghouse, PhD, CISM (SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX), James F 9781555583385 Elsevier Science & Technology
IM Instant Messaging Security

ISBN: 9781555583385 / Angielski / Miękka / 2005 / 432 str.

ISBN: 9781555583385/Angielski/Miękka/2005/432 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Professional Security Ser CISM (SVP PhD John Rittinghouse; Ph.D. CISSP (James F. Ransome CISM PhD James F. Ransome

There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM...

There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterp...

cena: 264,43

 Business Continuity and Disaster Recovery for InfoSec Managers John Rittinghouse, PhD, CISM (SVP, Professional Security Services at SecureInfo Corporation in San Antonio, TX), James F 9781555583392 Elsevier Science & Technology
Business Continuity and Disaster Recovery for InfoSec Managers

ISBN: 9781555583392 / Angielski / Miękka / 2005 / 408 str.

ISBN: 9781555583392/Angielski/Miękka/2005/408 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Professional Security Ser CISM (SVP PhD John Rittinghouse; Ph.D. CISSP (James F. Ransome CISM PhD James F. Ransome
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.

This book has been written by battle tested security consultants who have based all the material, processes and...

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has be...
cena: 281,62

 Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery Weikum, Gerhard 9781558605084 Morgan Kaufmann Publishers
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery

ISBN: 9781558605084 / Angielski / Twarda / 2001 / 852 str.

ISBN: 9781558605084/Angielski/Twarda/2001/852 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Gottfried Vossen; Gerhard Weikum; Gerhard Weikum

Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions. The authors emphasize formal models that are easily applied across fields, that promise to...

Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weiku...

cena: 514,26

 Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity Campbell, John Edward 9781560234319 Haworth Press
Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity

ISBN: 9781560234319 / Angielski / Twarda / 2004 / 242 str.

ISBN: 9781560234319/Angielski/Twarda/2004/242 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
John Edward Campbell
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online
Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity examines the online embodied experiences of gay men. At once scholarly and sensual, this unique book is the result of a three-year ethnographic study chronicling the activities on three distinct social scenes in the world of Internet Relay Chat (IRC)--virtual spaces constructed by gay men for the erotic exploration of the male body. Examining the vital role the body plays in...
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online
Gettin...
cena: 734,66

 Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity Campbell, John Edward 9781560234326 Harrington Park Press
Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity

ISBN: 9781560234326 / Angielski / Miękka / 2004 / 221 str.

ISBN: 9781560234326/Angielski/Miękka/2004/221 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
John Edward Campbell; Larry P. Gross
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity examines the online embodied experiences of gay men. At once scholarly and sensual, this unique book is the result of a three-year ethnographic study chronicling the activities on three distinct social scenes in the world of Internet Relay Chat (IRC)-virtual spaces constructed by gay men for the erotic exploration of the male body. Examining the vital role the body plays in...
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online Getting It ...
cena: 235,04

 Librarians on the Internet: Impact on Reference Services Kinder, Robin 9781560246725 Haworth Press
Librarians on the Internet: Impact on Reference Services

ISBN: 9781560246725 / Angielski / Twarda / 1994 / 420 str.

ISBN: 9781560246725/Angielski/Twarda/1994/420 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Robin Kinder
Here is one of the first books to focus on the Internet's impact on library services. Libraries have evolved over many years and contain traditions of organization. The Internet---disorganized, fluid, mutative--challenges the logic of the librarian. How responsive are librarians to the Internet? How do they use it? What are their interests? What does the Internet mean to their world? Librarians on the Internet addresses many questions such as these and provides a snapshot of librarians'work with the Internet.

Authors from around the United States and Canada discuss many aspects of...
Here is one of the first books to focus on the Internet's impact on library services. Libraries have evolved over many years and contain traditions of...
cena: 313,40

 Digital Preservation and Metadata: History, Theory, Practice Lazinger, Susan S. 9781563087776 Libraries Unlimited
Digital Preservation and Metadata: History, Theory, Practice

ISBN: 9781563087776 / Angielski / Miękka / 2001 / 359 str.

ISBN: 9781563087776/Angielski/Miękka/2001/359 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Susan S. Lazinger; Helen R. Tibbo

Protect your digital resources This book addresses critical issues of preservation, giving you everything you need to effectively protect your resources-from dealing with obsolescence, to responsibilities, methods of preservation, cost, and metadata formats. It also gives examples of numerous national and international institutions that provide frameworks for digital libraries and archives. A long-overdue text for anyone involved in the preservation of digital information, this book is critical in understanding today's methods and practices, intellectual discourse, and preservation...

Protect your digital resources This book addresses critical issues of preservation, giving you everything you need to effectively protect your res...

cena: 257,72

 Subject Analysis in Online Catalogs Olson, Hope a. 9781563088001 Libraries Unlimited
Subject Analysis in Online Catalogs

ISBN: 9781563088001 / Angielski / Miękka / 2001 / 333 str.

ISBN: 9781563088001/Angielski/Miękka/2001/333 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Hope A. Olson; John J. Boll; John J. Boll

Significantly updated and expanded, this second edition offers a far more comprehensive and sophisticated treatment of the subject area than can be found in other sources. It revisits the subject of cataloging and analyzes it in the context of today's digital environment, providing a fascinating examination of the components that are crucial for successful and effective subject retrieval in online public access catalogs. From language issues to problems of indexing and classification, this book guides you through the theoretical and practical frameworks of information storage and retrieval...

Significantly updated and expanded, this second edition offers a far more comprehensive and sophisticated treatment of the subject area than can be...

cena: 257,72

 Techno-Security in an Age of Globalization: Perspectives from the Pacific Rim Simon, Denis Fred 9781563246739 M.E. Sharpe
Techno-Security in an Age of Globalization: Perspectives from the Pacific Rim

ISBN: 9781563246739 / Angielski / Miękka / 1996 / 288 str.

ISBN: 9781563246739/Angielski/Miękka/1996/288 str.

Termin realizacji zamówienia: ok. 22 dni roboczych.
Denis F. Simon
This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and traditional military security issues seem to have receded due to the end of the Cold War.
This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and tradit...
cena: 107,70

 Java Cryptography Jonathan Knudsen 9781565924024 O'Reilly Media
Java Cryptography

ISBN: 9781565924024 / Angielski / Miękka / 1998 / 364 str.

ISBN: 9781565924024/Angielski/Miękka/1998/364 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Jonathan Knudsen

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java...

Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides t...

cena: 176,27

Podprzednia  7  8  9  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia