• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5023

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 Network Security: Step by Step Tutorials Balakrishnan D Umasree M Sridevi N 9781304764003 Lulu.com
Network Security: Step by Step Tutorials

ISBN: 9781304764003 / Angielski

ISBN: 9781304764003/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 151,95

 
Understanding Cyber Security Essentials: A Beginner's Guide

ISBN: 9781300802976 / Angielski

ISBN: 9781300802976/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 152,58

 Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps Ashish Mishra   9789395968997 Orange Education Pvt Ltd
Cloud Security Handbook for Architects: Practical Strategies and Solutions for Architecting Enterprise Cloud Security using SECaaS and DevSecOps

ISBN: 9789395968997 / Angielski

ISBN: 9789395968997/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Ashish Mishra
cena: 152,62

 
Infrastructure Attack Strategies for Ethical Hacking

ISBN: 9788196994723 / Angielski

ISBN: 9788196994723/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Harpreet Singh; Himanshu Sharma
cena: 152,62

 Hacking: Basic Security, Penetration Testing and How to Hack Isaac Sharpe 9781329463158 Lulu.com
Hacking: Basic Security, Penetration Testing and How to Hack

ISBN: 9781329463158 / Angielski / Twarda / 2015 / 148 str.

ISBN: 9781329463158/Angielski/Twarda/2015/148 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Isaac Sharpe
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? . This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Within this book's pages, you'll find the answers to these questions and more. Just some of the questions and topics covered include: Penetration Testing Grey Hat Hacking Basic Security Guidelines General Tips Of Computer Safety How to Hack This book...
Do You Want To Learn How To Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking...
cena: 152,66

 Social Engineering and Human Hacking: Strategies for the Prevention and Defense Against Manipulation Techniques in IT Michael Willer 9783662720837 Springer Vieweg
Social Engineering and Human Hacking: Strategies for the Prevention and Defense Against Manipulation Techniques in IT

ISBN: 9783662720837 / Angielski

ISBN: 9783662720837/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael Willer
cena: 152,93

 Perfect Password: Selection, Protection, Authentication Mark Burnett (Independent researcher, consultant, and writer specializing in Windows security) 9781597490412 Syngress Media,U.S.
Perfect Password: Selection, Protection, Authentication

ISBN: 9781597490412 / Angielski / Miękka / 2005 / 182 str.

ISBN: 9781597490412/Angielski/Miękka/2005/182 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
and writer consultant Mark Burnett (Independent researcher
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while s...
cena: 154,62

 
Der OPNsense-Praktiker: Enterprise-Firewalls mit Open Source

ISBN: 9783769378498 / Niemiecki

ISBN: 9783769378498/Niemiecki

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 154,82

 Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools Celestin Ntemngwa 9780578847993 Celestin Ntemngwa
Enterprise Information Security Risk Assessment: Practical Guide, Techniques and Tools

ISBN: 9780578847993 / Angielski / Miękka / 2021 / 142 str.

ISBN: 9780578847993/Angielski/Miękka/2021/142 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 155,18

 Android Application Pentesting Handbook MR Samuel Huntley 9781530176977 Createspace Independent Publishing Platform
Android Application Pentesting Handbook

ISBN: 9781530176977 / Angielski / Miękka / 2016 / 120 str.

ISBN: 9781530176977/Angielski/Miękka/2016/120 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
MR Samuel Huntley
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android applications. The book does not waste time in talking about Android fundamentals and other things that are not relevant to actual hacking which most of the books on this material talk about. This is supposed to provide directions to anyone who is interested in learning the art of pentesting Andoroid applications.
This book provides the basics on hacking Android applications. This book is supposed to help beginners learn the art of exploiting Android application...
cena: 155,22

 Red Team: An Attack Paradigm MR Richard Knowell 9781542785068 Createspace Independent Publishing Platform
Red Team: An Attack Paradigm

ISBN: 9781542785068 / Angielski / Miękka / 2017 / 212 str.

ISBN: 9781542785068/Angielski/Miękka/2017/212 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 155,22

 Advanced Penetration Testing: Hacking AWS Knowell, Richard 9781723317620 Createspace Independent Publishing Platform
Advanced Penetration Testing: Hacking AWS

ISBN: 9781723317620 / Angielski / Miękka / 2018 / 298 str.

ISBN: 9781723317620/Angielski/Miękka/2018/298 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 155,22

 Hardening AWS Russell D Nomer Cissp   9798386961701 Independently Published
Hardening AWS

ISBN: 9798386961701 / Angielski

ISBN: 9798386961701/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Russell D Nomer Cissp
cena: 155,22

 
101 Labs - CompTIA CySA+

ISBN: 9798859601288 / Angielski / Miękka / 2023 / 598 str.

ISBN: 9798859601288/Angielski/Miękka/2023/598 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 155,22

 
Advanced Penetration Testing: Hacking Satellite Communication

ISBN: 9798884400924 / Angielski / Miękka / 2024 / 242 str.

ISBN: 9798884400924/Angielski/Miękka/2024/242 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 155,22

 Inside the Enemy's Computer Identifying Cyber-Attackers Guitton, Clement 9781849045544
Inside the Enemy's Computer Identifying Cyber-Attackers

ISBN: 9781849045544 / Angielski / Twarda / 2017 / 224 str.

ISBN: 9781849045544/Angielski/Twarda/2017/224 str.

Termin realizacji zamówienia: ok. 30 dni roboczych.
Clement Guitton
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book explores the complexities of attribution
When your business, your defence ministry or your PC is hacked, how do you know who did it, given the limitless range of possible culprits? This book ...
cena: 155,61

 An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments Kushantha Gunawardana 9781801810210 Packt Publishing
An Ethical Guide to Cyber Anonymity: Concepts, tools, and techniques to protect your anonymity from criminals, unethical hackers, and governments

ISBN: 9781801810210 / Angielski / Miękka / 2022 / 322 str.

ISBN: 9781801810210/Angielski/Miękka/2022/322 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book DescriptionAs the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise privacy. Your actions on the web are being tracked, information is being stored, and your identity could be stolen. However, there are ways to...
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public...
cena: 157,04

 Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory Giuseppe Di Federico Fabrizio Barcaroli 9781801810845 Packt Publishing
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory

ISBN: 9781801810845 / Angielski / Miękka / 2022 / 258 str.

ISBN: 9781801810845/Angielski/Miękka/2022/258 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know about different identity patterns and implementing them in real-world scenarios Handle multi-IDP-related common situations no matter how big your organization Gain practical insights into OAuth implementation patterns and flows Book DescriptionIdentity is paramount for every architecture design, making it crucial for enterprise and solutions architects to understand the benefits and pitfalls of implementing identity patterns. However,...
Get to grips with identity patterns and design a structured enterprise identity model for cloud applications Key Features Learn all you need to know...
cena: 157,04

 The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout 9781803238876 Packt Publishing
The Vulnerability Researcher\'s Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities

ISBN: 9781803238876 / Angielski / Miękka / 2023 / 260 str.

ISBN: 9781803238876/Angielski/Miękka/2023/260 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receiving credit for your work Key Features Build successful strategies for planning and executing zero-day vulnerability research Find the best ways to disclose vulnerabilities while avoiding vendor conflict Learn to navigate the complicated CVE publishing process to receive credit for your research Book DescriptionVulnerability researchers are in increasingly high demand as the number of security incidents related to crime continues to rise with...
Learn the right way to discover, report, and publish security vulnerabilities to prevent exploitation of user systems and reap the rewards of receivin...
cena: 157,04

 
Rust for Blockchain Application Development: Learn to build decentralized applications on popular blockchain technologies using Rust

ISBN: 9781837634644 / Angielski

ISBN: 9781837634644/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 157,04

Podprzednia  91  92  93  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia