
ilość książek w kategorii: 5009
![]() |
Algorithmic Cryptanalysis
ISBN: 9781420070026 / Angielski / Twarda / 2009 / 501 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox, Hadamard-Fourier-Walsh transforms, lattice reduction, and Grobner bases. The author also presents advanced applications, such as LFSR-based stream ciphers, lattice methods for cryptanalysis, elliptic curves, and index calculus methods. He includes some hints and solutions to... Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples... |
cena:
710,17 |
![]() |
Unix, Solaris and Linux: A Practical Security Cookbook: Securing Unix Operating System Without Third-Party Applications
ISBN: 9781420848243 / Angielski / Twarda / 2005 / 341 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....
Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box," opera...
|
cena:
227,37 |
![]() |
Computer Security and Telerobotics for Everyone
ISBN: 9781420896824 / Angielski / Miękka / 2005 / 179 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
83,43 |
![]() |
Windows Server 2003 Security Infrastructures: Core Security Features
ISBN: 9781555582838 / Angielski / Miękka / 2004 / 784 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003 operating system. It also highlights the security principles an architect should remember when designing an infrastructure that is rooted on the Windows Server 2003 OS. *Explains nuts and bolts of Windows Server...
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to l...
|
cena:
293,81 |
![]() |
Firewalls: Jumpstart for Network and Systems Administrators
ISBN: 9781555582975 / Angielski / Miękka / 2004 / 448 str. Termin realizacji zamówienia: ok. 30 dni roboczych. In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing...
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web se...
|
cena:
288,92 |
![]() |
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 9781555582982 / Angielski / Miękka / 2003 / 398 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be ...
|
cena:
264,43 |
![]() |
Implementing Homeland Security for Enterprise IT
ISBN: 9781555583125 / Angielski / Miękka / 2004 / 299 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector...
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures...
|
cena:
249,73 |
![]() |
Physical Security for IT
ISBN: 9781555583279 / Angielski / Miękka / 2004 / 256 str. Termin realizacji zamówienia: ok. 30 dni roboczych. The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into...
The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the vir...
|
cena:
259,53 |
![]() |
Voice over Internet Protocol (VoIP) Security
ISBN: 9781555583323 / Angielski / Miękka / 2004 / 432 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to...
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in...
|
cena:
254,64 |
![]() |
Implementing Database Security and Auditing
ISBN: 9781555583347 / Angielski / Miękka / 2005 / 432 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to...
This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditin...
|
cena:
281,62 |
![]() |
IM Instant Messaging Security
ISBN: 9781555583385 / Angielski / Miękka / 2005 / 432 str. Termin realizacji zamówienia: ok. 30 dni roboczych. There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM... There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterp... |
cena:
264,43 |
![]() |
Business Continuity and Disaster Recovery for InfoSec Managers
ISBN: 9781555583392 / Angielski / Miękka / 2005 / 408 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes and... Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has be... |
cena:
281,62 |
![]() |
Transactional Information Systems: Theory, Algorithms, and the Practice of Concurrency Control and Recovery
ISBN: 9781558605084 / Angielski / Twarda / 2001 / 852 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weikum and Vossen begin with a broad look at the role of transactional technology in today's economic and scientific endeavors, then delve into critical issues faced by all practitioners, presenting today's most effective techniques for controlling concurrent access by multiple clients, recovering from system failures, and coordinating distributed transactions. The authors emphasize formal models that are easily applied across fields, that promise to... Transactional Information Systems is the long-awaited, comprehensive work from leading scientists in the transaction processing field. Weiku... |
cena:
514,26 |
![]() |
Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity
ISBN: 9781560234319 / Angielski / Twarda / 2004 / 242 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online
Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity examines the online embodied experiences of gay men. At once scholarly and sensual, this unique book is the result of a three-year ethnographic study chronicling the activities on three distinct social scenes in the world of Internet Relay Chat (IRC)--virtual spaces constructed by gay men for the erotic exploration of the male body. Examining the vital role the body plays in... Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online
Gettin... |
cena:
734,66 |
![]() |
Getting It on Online: Cyberspace, Gay Male Sexuality, and Embodied Identity
ISBN: 9781560234326 / Angielski / Miękka / 2004 / 221 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online Getting It On Online: Cyberspace, Gay Male Sexuality, and Embodied Identity examines the online embodied experiences of gay men. At once scholarly and sensual, this unique book is the result of a three-year ethnographic study chronicling the activities on three distinct social scenes in the world of Internet Relay Chat (IRC)-virtual spaces constructed by gay men for the erotic exploration of the male body. Examining the vital role the body plays in...
Learn how gay men use Internet technologies to connect with others sharing their erotic desires and to forge affirming communities online Getting It ...
|
cena:
235,04 |
![]() |
Librarians on the Internet: Impact on Reference Services
ISBN: 9781560246725 / Angielski / Twarda / 1994 / 420 str. Termin realizacji zamówienia: ok. 22 dni roboczych. Here is one of the first books to focus on the Internet's impact on library services. Libraries have evolved over many years and contain traditions of organization. The Internet---disorganized, fluid, mutative--challenges the logic of the librarian. How responsive are librarians to the Internet? How do they use it? What are their interests? What does the Internet mean to their world? Librarians on the Internet addresses many questions such as these and provides a snapshot of librarians'work with the Internet.Authors from around the United States and Canada discuss many aspects of...
Here is one of the first books to focus on the Internet's impact on library services. Libraries have evolved over many years and contain traditions of...
|
cena:
313,40 |
![]() |
Digital Preservation and Metadata: History, Theory, Practice
ISBN: 9781563087776 / Angielski / Miękka / 2001 / 359 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Protect your digital resources This book addresses critical issues of preservation, giving you everything you need to effectively protect your resources-from dealing with obsolescence, to responsibilities, methods of preservation, cost, and metadata formats. It also gives examples of numerous national and international institutions that provide frameworks for digital libraries and archives. A long-overdue text for anyone involved in the preservation of digital information, this book is critical in understanding today's methods and practices, intellectual discourse, and preservation... Protect your digital resources This book addresses critical issues of preservation, giving you everything you need to effectively protect your res... |
cena:
257,72 |
![]() |
Subject Analysis in Online Catalogs
ISBN: 9781563088001 / Angielski / Miękka / 2001 / 333 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Significantly updated and expanded, this second edition offers a far more comprehensive and sophisticated treatment of the subject area than can be found in other sources. It revisits the subject of cataloging and analyzes it in the context of today's digital environment, providing a fascinating examination of the components that are crucial for successful and effective subject retrieval in online public access catalogs. From language issues to problems of indexing and classification, this book guides you through the theoretical and practical frameworks of information storage and retrieval... Significantly updated and expanded, this second edition offers a far more comprehensive and sophisticated treatment of the subject area than can be... |
cena:
257,72 |
![]() |
Techno-Security in an Age of Globalization: Perspectives from the Pacific Rim
ISBN: 9781563246739 / Angielski / Miękka / 1996 / 288 str. Termin realizacji zamówienia: ok. 22 dni roboczych. This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and traditional military security issues seem to have receded due to the end of the Cold War.
This text assesses the changing dimensions of national security in a world where business and technology issues have moved to centre stage, and tradit...
|
cena:
107,70 |
![]() |
Java Cryptography
ISBN: 9781565924024 / Angielski / Miękka / 1998 / 364 str. Termin realizacji zamówienia: ok. 30 dni roboczych. Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java... Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides t... |
cena:
176,27 |