
ilość książek w kategorii: 5083
![]() |
Cryptography & Raspberry Pi 2
ISBN: 9781523611461 / Angielski / Miękka / 2016 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAYIs Raspberry Pi 2 what you want to learn? Always wondered how one becomes... Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
39,97 |
![]() |
Cryptography & Robotics
ISBN: 9781523614158 / Angielski / Miękka / 2016 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAY Robotics at its best Discover A Book That Tells You What You Should Do...Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
39,97 |
![]() |
Cryptography & Open Source
ISBN: 9781523662401 / Angielski / Miękka / 2016 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAYIs Open Source what you want to learn? Always wondered how one becomes a... Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
39,97 |
![]() |
Cryptography & CompTIA A+
ISBN: 9781523662524 / Angielski / Miękka / 2016 / 56 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work? Purchase Cryptography to discover everything you need to know about it Step by step to increase your skill set in its basics. Learn the pros and cons. All your basic knowledge in one purchase You need to get it now to know whats inside as it cant be shared here Purchase Cryptography TODAYIs CompTIA A+ what you want to learn? Always wondered what A+ was? Does it... Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryp... |
cena:
39,97 |
![]() |
Guide to Securing Legacy IEEE 802.11 Wireless Networks
ISBN: 9781495990243 / Angielski / Miękka / 2008 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that cannot use IEEE 802.11i. Details on securing WLANs capable of IEEE 802.11i can be found in NIST Special Publication (SP) 800-97. Recommendations for securely using external WLANs, such as public wireless access points, are outside the scope of this document.
The purpose of this document is to provide guidance to organizations in securing their legacy IEEE 802.11 wireless local area networks (WLAN) that can...
|
cena:
40,02 |
![]() |
Managing Information Security Risk: Organization, Mission, and Information System View
ISBN: 9781497525795 / Angielski / Miękka / 2011 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document provides guidance for an integrated, organization-wide program for managing information security risk to organizational operations (i.e., mission, functions, image, and reputation), organizational assets, individuals, other organizations and the Nation resulting from the operation and use of federal information systems.
This document provides guidance for an integrated, organization-wide program for managing information security risk to organizational operations (i.e....
|
cena:
40,02 |
![]() |
Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations
ISBN: 9781497527546 / Angielski / Miękka / 2011 / 84 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance with organizational risk tolerance.
This publication specifically addresses assessment and analysis of security control effectiveness and of organizational security status in accordance ...
|
cena:
40,02 |
![]() |
The 2016 Dyn DDOS Cyber Attack Analysis: The Attack that Broke the Internet for a Day
ISBN: 9781721165230 / Angielski / Miękka / 2018 / 46 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,06 |
![]() |
Managed Detection and Response Services: A Cyber Stakeholders Guide
ISBN: 9798323689392 / Angielski / Miękka / 2024 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,06 |
![]() |
Cybersecurity Laws for Seniors: Mastering Cybersecurity in the Age of AI and Quantum Computing: A Comprehensive Guide to Safeguarding Against Advanced Threats, IoT Vulnerabilities
ISBN: 9798346659204 / Angielski / Miękka / 2024 / 146 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,06 |
![]() |
Complete Guide to Internet Privacy, Anonymity & Security
ISBN: 9783950309348 / Angielski / Miękka / 2015 / 260 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inform and protect yourself. In this comprehensive yet easy-to-read guide for Windows users, you will quickly learn how to:
Fully updated and revised, this leading guide on Internet privacy, anonymity and security contains all the practical information you need to inf... |
cena:
40,18 |
![]() |
WordPress Security: Protection from Hackers
ISBN: 9781482537062 / Angielski / Miękka / 2013 / 70 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Steps You Can Take To Secure Your Website And Keep It Virtually Hack-Proof If you're like most people these days, you always go the extra step to keep yourself, your loved ones, and your possessions safe. You probably lock your doors at night... maybe you even have a home security system. You might have a car alarm installed as well. If I looked at your computer, I'd probably find an antivirus and a running firewall. That covers everything, right?...
IS YOUR WORDPRESS WEBSITE REALLY AS SAFE AS YOU THINK IT IS?... WARNING Your Wordpress Website Might Be At Risk Of Being Hacked Discover The Easy Ste...
|
cena:
40,26 |
![]() |
NIST Special Publication 800-53 Information Security
ISBN: 9781461112358 / Angielski / Miękka / 2011 / 240 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," and catalogs security controls for all U.S. federal information systems except those related to national security. It is published by the National Institute of Standards and Technology, which is a non-regulatory agency of the United States Department of Commerce. NIST develops and issues standards, guidelines, and other publications to assist federal agencies in implementing the Federal Information Security Management Act of 2002 (FISMA) and to help with managing cost effective...
NIST Special Publication 800-53, "Recommended Security Controls for Federal Information Systems and Organizations," and catalogs security controls for...
|
cena:
40,26 |
![]() |
Security Solutions for AWS: Understanding Network Security and Performance Monitoring for Amazon Web Services
ISBN: 9780947480554 / Angielski / Miękka / 2017 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,26 |
![]() |
Florida's Information Protection Statute 501.171: Where Do You Stand?
ISBN: 9781533175113 / Angielski / Miękka / 2016 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,26 |
![]() |
Hacking With Kali Linux: The Ultimate Guide For Beginners To Hack With Kali Linux. Learn About Basics Of Hacking, Cybersecurity, Wireless Netwo
ISBN: 9781660419234 / Angielski / Miękka / 2020 / 236 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,26 |
![]() |
Scam-Free Living: How to Prevent Scammers from Stealing Your Hard-Earned Money
ISBN: 9798324297381 / Angielski / Miękka / 2024 / 142 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,26 |
![]() |
Godfathers and Cybersecurity: A Gangster's Take on Cyber Security
ISBN: 9798862504613 / Angielski / Miękka / 2024 / 218 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
40,26 |
![]() |
Making Passwords Secure: Fixing the Weakest Link in Cybersecurity
ISBN: 9781530164486 / Angielski / Miękka / 2016 / 170 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. ENTERPRISE CYBERSECURITY's most ignored risk is... User Authentication When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees - the weakest link in the cybersecurity chain. Passwords are not the problem. The management of passwords is the real security nightmare. Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend...
ENTERPRISE CYBERSECURITY's most ignored risk is... User Authentication When end users are...
|
cena:
40,34 |