• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950116]
• Literatura piękna
 [1816336]
• Turystyka
 [70365]
• Informatyka
 [151382]
• Komiksy
 [36157]
• Encyklopedie
 [23168]
• Dziecięca
 [611655]
• Hobby
 [135936]
• AudioBooki
 [1800]
• Literatura faktu
 [225852]
• Muzyka CD
 [388]
• Słowniki
 [2970]
• Inne
 [446238]
• Kalendarze
 [1179]
• Podręczniki
 [166839]
• Poradniki
 [469514]
• Religia
 [507394]
• Czasopisma
 [506]
• Sport
 [61426]
• Sztuka
 [242327]
• CD, DVD, Video
 [3461]
• Technologie
 [219652]
• Zdrowie
 [98967]
• Książkowe Klimaty
 [123]
• Zabawki
 [2482]
• Puzzle, gry
 [3735]
• Literatura w języku ukraińskim
 [264]
• Art. papiernicze i szkolne
 [7903]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5024

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) Mehta, Ketan 9781495984983 Createspace
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)

ISBN: 9781495984983 / Angielski / Miękka / 2008 / 74 str.

ISBN: 9781495984983/Angielski/Miękka/2008/74 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
William MacGregor; Ketan Mehta; David Cooper
The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Specifically, the document recommends a risk-based approach for selecting appropriate PIV authentication mechanisms to manage physical access to Federal government facilities and assets.
The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Sp...
cena: 54,67

 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher U. S. Department of Commerce-Nist 9781497528178 Createspace
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher

ISBN: 9781497528178 / Angielski / Miękka / 2012 / 36 str.

ISBN: 9781497528178/Angielski/Miękka/2012/36 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
U. S. Department of Commerce-Nist
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2-compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This Recommendation defines the mathematical steps required to...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algo...
cena: 54,67

 Cloud Computing Synopsis and Recommendations Lee Badger Tim Grance Robert Patt-Corner 9781497549968 Createspace
Cloud Computing Synopsis and Recommendations

ISBN: 9781497549968 / Angielski / Miękka / 2012 / 88 str.

ISBN: 9781497549968/Angielski/Miękka/2012/88 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lee Badger; Tim Grance; Robert Patt-Corner
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the relative opportunities and risks of cloud computing. Cloud computing has been the subject of a great deal of commentary. Attempts to describe cloud computing in general terms, however, have been problematic because cloud computing is not a single kind of system, but instead spans a spectrum of underlying technologies,...
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of...
cena: 54,67

 #Lazarus10 Rajan, Andrew 9780993068737 San Fernando Press
#Lazarus10

ISBN: 9780993068737 / Angielski / Miękka / 2016 / 296 str.

ISBN: 9780993068737/Angielski/Miękka/2016/296 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Andrew Rajan

"He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John 11:21-26

Tony Peso's world is turned upside down the first time he is plugged into a cryonically frozen head, to experience their last ten seconds of life. If this was properly marketed, it could be massive...

Ignoring the moral implications and ably assisted by Cryo-Biochemist Davis, Brit-abroad Tony makes millions selling this mind-blowing one-off hit to Billionaires.

Way out of his depth from layers of deceit, he soon...

"He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John...

cena: 54,75

 Cryptocurrency: The Ultimate Guide on Cryptocurrency Neo Monefa 9781973879176 Createspace Independent Publishing Platform
Cryptocurrency: The Ultimate Guide on Cryptocurrency

ISBN: 9781973879176 / Angielski / Miękka / 2017 / 48 str.

ISBN: 9781973879176/Angielski/Miękka/2017/48 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Neo Monefa
Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, digital currency can be defined as a medium of exchange just like the usual currencies such as USD. However, what makes them different from the conventional currencies is that they are designed to exchange digital information by using the principles of cryptography. This cryptography controls the security of transactions as well as the mining of new coins. A Snapshot of What You Will Learn - Cryptocurrency Vs. Fiat Money - How BitCoin Achieved...
Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, d...
cena: 54,90

 How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid Patrick X Gallagher, Bruce Johnston, Lisa Zahn 9781542407724 Createspace Independent Publishing Platform
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid

ISBN: 9781542407724 / Angielski / Miękka / 2017 / 86 str.

ISBN: 9781542407724/Angielski/Miękka/2017/86 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Patrick X Gallagher;Bruce Johnston;Lisa Zahn
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No other online accounts should use this email address How to set up two step verification. Important point is to use a cell phone you do not have listed on your LinkedIn profile How much is your data worth? How to remove your birthdate from your profile. How to turn off your profile being public on search engines Phishing - how to recognize a phishing attempt and what LinkedIn does to protect their LinkedIn members Login with less devices. This...
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No...
cena: 54,99

 Cybersecurity Government Accountability Office 9781482383966 Createspace
Cybersecurity

ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str.

ISBN: 9781482383966/Angielski/Miękka/2013/66 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Government Accountability Office
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
cena: 55,06

 Cybresecurity: Selected Legal Issues Edward C. Liu Gina Stevens Kathleen Ann Ruane 9781482384062 Createspace
Cybresecurity: Selected Legal Issues

ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str.

ISBN: 9781482384062/Angielski/Miękka/2013/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Edward C. Liu; Gina Stevens; Kathleen Ann Ruane
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
cena: 55,06

 Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement Kristin M. Finklea Catherine a. Theohary 9781477650080 Createspace
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement

ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str.

ISBN: 9781477650080/Angielski/Miękka/2012/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Kristin M. Finklea; Catherine a. Theohary
cena: 55,06

 Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1) John Padgette Karen Scarfone Lily Chen 9781478168966 Createspace
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)

ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str.

ISBN: 9781478168966/Angielski/Miękka/2012/50 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
John Padgette; Karen Scarfone; Lily Chen
cena: 55,06

 Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2 Barker, Elaine 9781478178170 Createspace
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2

ISBN: 9781478178170 / Angielski / Miękka / 2012 / 36 str.

ISBN: 9781478178170/Angielski/Miękka/2012/36 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
William C. Barker; Elaine Barker; U. S. Department of Commerce
cena: 55,06

 Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617) Delaitre, Aurelien 9781478179597 Createspace
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617)

ISBN: 9781478179597 / Angielski / Miękka / 2012 / 38 str.

ISBN: 9781478179597/Angielski/Miękka/2012/38 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Wayne Jansen; Aurelien Delaitre
cena: 55,06

 Assessment of Access Control Systems Nist 9781493756292 Createspace
Assessment of Access Control Systems

ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str.

ISBN: 9781493756292/Angielski/Miękka/2013/72 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
cena: 55,06

 Border Gateway Protocol Security Nist 9781494469733 Createspace
Border Gateway Protocol Security

ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str.

ISBN: 9781494469733/Angielski/Miękka/2013/64 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
cena: 55,06

 Computer Security Incident Handling Guide Nist 9781494726379 Createspace
Computer Security Incident Handling Guide

ISBN: 9781494726379 / Angielski / Miękka / 2013 / 94 str.

ISBN: 9781494726379/Angielski/Miękka/2013/94 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not only more numerous and diverse but also more damaging and disruptive. An incident response capability is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited, and restoring computing services. This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and effectively. Topics covered include...
Computer security incident response has become an important component of information technology (IT) programs. Securityrelated threats have become not...
cena: 55,06

 Recommendation for Block Cipher Modes of Operation Methods and Techniques Nist 9781495211041 Createspace
Recommendation for Block Cipher Modes of Operation Methods and Techniques

ISBN: 9781495211041 / Angielski / Miękka / 2014 / 70 str.

ISBN: 9781495211041/Angielski/Miękka/2014/70 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data.
This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebo...
cena: 55,06

 Computer Security Division 2010 Annual Report Nist 9781493763399 Createspace
Computer Security Division 2010 Annual Report

ISBN: 9781493763399 / Angielski / Miękka / 2013 / 70 str.

ISBN: 9781493763399/Angielski/Miękka/2013/70 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year 2010. It discusses all projects and programs within the Division, staff highlights, and publications.
This annual report covers the work conducted within the National Institute of Standards and Technology's Computer Security Division during Fiscal Year...
cena: 55,06

 Computer Security Division 2011 Annual Report Nist 9781493763450 Createspace
Computer Security Division 2011 Annual Report

ISBN: 9781493763450 / Angielski / Miękka / 2013 / 80 str.

ISBN: 9781493763450/Angielski/Miękka/2013/80 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annual public report on activities undertaken in the previous year, and planned for the coming year, to carry out responsibilities under this law. The primary goal of the Computer Security Division (CSD), a component of NIST s Information Technology Laboratory (ITL), is to provide standards and technology that protects information systems against threats to the confidentiality, integrity, and availability of information and services. During Fiscal...
Title III of the E-Government Act of 2002, entitled the Federal Information Security Management Act (FISMA) of 2002, requires NIST to prepare an annua...
cena: 55,06

 Creating a Patch and Vulnerability Management Program Nist 9781494729035 Createspace
Creating a Patch and Vulnerability Management Program

ISBN: 9781494729035 / Angielski / Miękka / 2013 / 80 str.

ISBN: 9781494729035/Angielski/Miękka/2013/80 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The primary audience is security managers who are responsible for designing and implementing the program. However, this document also contains information useful to system administrators and operations personnel who are responsible for applying patches and deploying solutions (i.e., information related to testing patches and enterprise patching software).
This document provides guidance on creating a security patch and vulnerability management program and testing the effectiveness of that program. The p...
cena: 55,06

 A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) Nist 9781494458072 Createspace
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)

ISBN: 9781494458072 / Angielski / Miękka / 2013 / 84 str.

ISBN: 9781494458072/Angielski/Miękka/2013/84 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nist
cena: 55,06

Podprzednia  28  29  30  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia