
ilość książek w kategorii: 5081
| |
XL Large Print Password Tracker (Lock Shield Green): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16
ISBN: 9781834120393 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,15 |
| |
XL Large Print Password Tracker (Purple Irises on Navy): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its
ISBN: 9781834120614 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,15 |
| |
XL Large Print Password Tracker (Pink Tulips): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with its 16 pt Fon
ISBN: 9781834120621 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,15 |
| |
XL Large Print Password Tracker (Autumnal Warm Tone Tulips): 8"x10" 450+ Alphabetical Password Logbook for Easy Organization; Perfect for Seniors with
ISBN: 9781834120638 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,15 |
![]() |
Espionage Black Book Eight: Industrial Espionage Explained
ISBN: 9780645620979 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,19 |
![]() |
A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
ISBN: 9781495984983 / Angielski / Miękka / 2008 / 74 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Specifically, the document recommends a risk-based approach for selecting appropriate PIV authentication mechanisms to manage physical access to Federal government facilities and assets.
The purpose of this document is to describe a strategy allowing agencies to PIV-enable their PACS, and migrate to government-wide interoperability. Sp...
|
cena:
55,28 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher
ISBN: 9781497528178 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algorithm (DEA). When implemented in an SP 800-38-series-compliant mode of operation and in a FIPS 140-2-compliant cryptographic module, TDEA may be used by Federal organizations to protect sensitive unclassified data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This Recommendation defines the mathematical steps required to...
This publication specifies the Triple Data Encryption Algorithm (TDEA), including its primary component cryptographic engine, the Data Encryption Algo...
|
cena:
55,28 |
![]() |
Cloud Computing Synopsis and Recommendations
ISBN: 9781497549968 / Angielski / Miękka / 2012 / 88 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the relative opportunities and risks of cloud computing. Cloud computing has been the subject of a great deal of commentary. Attempts to describe cloud computing in general terms, however, have been problematic because cloud computing is not a single kind of system, but instead spans a spectrum of underlying technologies,...
This document reprises the NIST-established definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of...
|
cena:
55,28 |
![]() |
The Future of Violence - Robots and Germs, Hackers and Drones: Confronting the New Age of Threat
ISBN: 9781445666686 / Angielski / Miękka / 2017 / 336 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. The terrifying new role of technology in a world at war
The terrifying new role of technology in a world at war
|
cena:
55,31 |
![]() |
#Lazarus10
ISBN: 9780993068737 / Angielski / Miękka / 2016 / 296 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John 11:21-26 Tony Peso's world is turned upside down the first time he is plugged into a cryonically frozen head, to experience their last ten seconds of life. If this was properly marketed, it could be massive... Ignoring the moral implications and ably assisted by Cryo-Biochemist Davis, Brit-abroad Tony makes millions selling this mind-blowing one-off hit to Billionaires. Way out of his depth from layers of deceit, he soon... "He that believeth in me, though he were dead, yet shall he live: And whosoever liveth and believeth in me shall never die". John... |
cena:
55,36 |
![]() |
Cryptocurrency: The Ultimate Guide on Cryptocurrency
ISBN: 9781973879176 / Angielski / Miękka / 2017 / 48 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, digital currency can be defined as a medium of exchange just like the usual currencies such as USD. However, what makes them different from the conventional currencies is that they are designed to exchange digital information by using the principles of cryptography. This cryptography controls the security of transactions as well as the mining of new coins. A Snapshot of What You Will Learn - Cryptocurrency Vs. Fiat Money - How BitCoin Achieved...
Do You Want to Master the Next Generation of Currency? Cryptocurrency, or the electronically created line of codes of monetary value, or simply put, d...
|
cena:
55,52 |
![]() |
How to Bullet Proof Your LinkedIn Profile: 10 Security Issues to Avoid
ISBN: 9781542407724 / Angielski / Miękka / 2017 / 86 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No other online accounts should use this email address How to set up two step verification. Important point is to use a cell phone you do not have listed on your LinkedIn profile How much is your data worth? How to remove your birthdate from your profile. How to turn off your profile being public on search engines Phishing - how to recognize a phishing attempt and what LinkedIn does to protect their LinkedIn members Login with less devices. This...
Learn these 10 LinkedIn Security Principles and much more. To create a strong password and use an email address that is only used for LinkedIn.com. No...
|
cena:
55,60 |
![]() |
Cybersecurity
ISBN: 9781482383966 / Angielski / Miękka / 2013 / 66 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative in 2008.
In response to the ongoing threats for federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cy...
|
cena:
55,68 |
![]() |
Cybresecurity: Selected Legal Issues
ISBN: 9781482384062 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional interest. Critical infrastructure commonly refers to those entities that are so vital that their incapacitation or destruction would have a debilitating impact on national security, economic security, or the public health and safety. This report discusses selected legal issues that frequently arise in the context of recent legislation to address vulnerabilities of critical infrastructure to cyber threats, efforts to protect government networks...
The federal government's role in protecting U.S. citizens and critical infrastructure from cyber attacks has been the subject of recent congressional ...
|
cena:
55,68 |
![]() |
Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
ISBN: 9781477650080 / Angielski / Miękka / 2012 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology (Special Publication 800-121 Revision 1)
ISBN: 9781478168966 / Angielski / Miękka / 2012 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher: NIST Special Publication 800-67, Revision 2
ISBN: 9781478178170 / Angielski / Miękka / 2012 / 36 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Mobile Forensic Reference Materials: A Methodology and Reification (NIST IR 7617)
ISBN: 9781478179597 / Angielski / Miękka / 2012 / 38 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
55,68 |
![]() |
Assessment of Access Control Systems
ISBN: 9781493756292 / Angielski / Miękka / 2013 / 72 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense include some form of access control. In many systems access control takes the form of a simple password mechanism, but many require more sophisticated and complex control. In addition to the authentication mechanism (such as a password), access control is concerned with how authorizations are structured. In some cases, authorization may mirror the structure of the organization, while in others it may be based on the sensitivity level of various...
Access control is perhaps the most basic aspect of computer security. Nearly all applications that deal with financial, privacy, safety, or defense in...
|
cena:
55,68 |
![]() |
Border Gateway Protocol Security
ISBN: 9781494469733 / Angielski / Miękka / 2013 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers. While a number of enhanced protocols for BGP have been proposed, these generally require substantial changes to the protocol and may not interoperate with current BGP implementations. To improve the security of BGP routers, the recommendations listed below are introduced. While the recommendations can contribute to...
This document introduces the Border Gateway Protocol (BGP), explains its importance to the internet, and provides a set of best practices that can hel...
|
cena:
55,68 |