
ilość książek w kategorii: 5083
| |
XL Large Print Password Tracker (Lock Shield Gray): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16 p
ISBN: 9781834120379 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
| |
XL Large Print Password Tracker (Lock Shield Blue): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16 p
ISBN: 9781834120386 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
| |
XL Large Print Password Tracker (Lock Shield Green): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16
ISBN: 9781834120393 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
| |
XL Large Print Password Tracker (Purple Irises on Navy): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its
ISBN: 9781834120614 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
| |
XL Large Print Password Tracker (Pink Tulips): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16 pt Fon
ISBN: 9781834120621 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
| |
XL Large Print Password Tracker (Autumnal Warm Tone Tulips): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with
ISBN: 9781834120638 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,06 |
![]() |
Espionage Black Book Eight: Industrial Espionage Explained
ISBN: 9780645620979 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,11 |
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781495984983 / Angielski / Miękka / 2008 / 74 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Specifically, the document recommends a risk-based approach for selecting appropriate PIV authentication mechanisms to manage physical access to Federal government facilities and assets.
The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Sp...
|
cena:
56,21 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
ISBN: 9781497528178 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2-compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This Recommendation defines the mathematical steps required to...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algo...
|
cena:
56,21 |
![]() |
Cloud Computing Synopsis and Recommendations
ISBN: 9781497549968 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the relative opportunities and risks of cloud computing. Cloud computing has been the subject of a great deal of commentary. Attempts to describe cloud computing in general terms, however, have been problematic because cloud computing is not a single kind of system, but instead spans a spectrum of underlying technologies,...
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of...
|
cena:
56,21 |
![]() |
#Lazarus10
ISBN: 9780993068737 / Angielski / Miękka / 2016 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John 11:21-26 Tony Peso's world is turned upside down the first time he is plugged into a cryonically frozen head, to experience their last ten seconds of life. If this was properly marketed, it could be massive... Ignoring the moral implications and ably assisted by Cryo-Biochemist Davis, Brit-abroad Tony makes millions selling this mind-blowing one-off hit to Billionaires. Way out of his depth from layers of deceit, he soon... "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John... |
cena:
56,28 |
![]() |
The Human Firewall
ISBN: 9783658427566 / Niemiecki / Miękka / 2023 Termin realizacji zamówienia: ok. 16-18 dni roboczych. Nicht nur im privaten Umfeld, auch im beruflichen sind Computer, Smartphones und das Internet Begleiter unseres täglichen Lebens. Dabei spielt der Schutz von Informationen eine wichtige Rolle. Über 70% aller Cyber-Angriffe zielen auf den Nutzer ab, lediglich ein kleiner Teil auf die tatsächlichen Systeme. Daher sind geschulte und aufmerksame Mitarbeiter ein unabdingbarer Bestandteil der allgemeinen Sicherheitsstrategie zum Schutz der Informationen. Das Ziel ist dabei der Aufbau einer Kultur der Cyber-Sicherheit, einer sogenannten human firewall. Nicht nur im privaten Umfeld, auch im beruflichen sind Computer, Smartphones und das Internet Begleiter unseres täglichen Lebens. Dabei spielt der... |
cena:
56,40 |
![]() |
Cybersecurity-Awareness
ISBN: 9783658448134 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,40 |
![]() |
Cryptocurrency: The Ultimate Guide on Cryptocurrency
ISBN: 9781973879176 / Angielski / Miękka / 2017 / 48 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, digital currency can be defined as a medium of exchange just like the usual currencies such as USD. However, what makes them different from the conventional currencies is that they are designed to exchange digital information by using the principles of cryptography. This cryptography controls the security of transactions as well as the mining of new coins. A Snapshot of What You Will Learn - Cryptocurrency Vs. Fiat Money - How BitCoin Achieved...
Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, d...
|
cena:
56,45 |
![]() |
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid
ISBN: 9781542407724 / Angielski / Miękka / 2017 / 86 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No other online accounts should use this email address How to set up two step verification. Important point is to use a cell phone you do not have listed on your LinkedIn profile How much is your data worth? How to remove your birthdate from your profile. How to turn off your profile being public on search engines Phishing - how to recognize a phishing attempt and what LinkedIn does to protect their LinkedIn members Login with less devices. This...
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No...
|
cena:
56,52 |
![]() |
Cybersecurity
ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
|
cena:
56,61 |
![]() |
Cybresecurity: Selected Legal Issues
ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
|
cena:
56,61 |
![]() |
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
ISBN: 9781478178170 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
56,61 |