• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » Bezpieczeństwo

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949524]
• Literatura piękna
 [1817948]
• Turystyka
 [70715]
• Informatyka
 [151291]
• Komiksy
 [35671]
• Encyklopedie
 [23176]
• Dziecięca
 [612440]
• Hobby
 [136066]
• AudioBooki
 [1740]
• Literatura faktu
 [226030]
• Muzyka CD
 [378]
• Słowniki
 [2918]
• Inne
 [445441]
• Kalendarze
 [1181]
• Podręczniki
 [166545]
• Poradniki
 [469898]
• Religia
 [508035]
• Czasopisma
 [502]
• Sport
 [61392]
• Sztuka
 [242759]
• CD, DVD, Video
 [3348]
• Technologie
 [219537]
• Zdrowie
 [98738]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3543]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Bezpieczeństwo

ilość książek w kategorii: 5023

Wyświetl książki:
Dostępne języki:
Cena:
od:
do:
ilość na stronie:


 The Cybersecurity Framework - DRAFT NISTIR 8170: Implementation Guidance for Federal Agencies Standards, National Instituteof 9781547074358 Createspace Independent Publishing Platform
The Cybersecurity Framework - DRAFT NISTIR 8170: Implementation Guidance for Federal Agencies

ISBN: 9781547074358 / Angielski / Miękka / 2017 / 44 str.

ISBN: 9781547074358/Angielski/Miękka/2017/44 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 63,28

 
Künstliche Intelligenz: Von Werkzeug zu Partner der Menschheit: Die Evolution der Mensch-Maschine-Beziehungen: Herausforderungen, Chancen und neue Horizonte

ISBN: 9798341395800 / Niemiecki / Miękka / 2024 / 96 str.

ISBN: 9798341395800/Niemiecki/Miękka/2024/96 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 63,28

 Cloud Computing Service Metrics Descriptions: NiST SP 500-307 National Institute of Standards and Tech 9781718787773 Createspace Independent Publishing Platform
Cloud Computing Service Metrics Descriptions: NiST SP 500-307

ISBN: 9781718787773 / Angielski / Miękka / 2018 / 46 str.

ISBN: 9781718787773/Angielski/Miękka/2018/46 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
National Institute of Standards and Tech
cena: 63,40

 
Bug Bytes

ISBN: 9781434105288 / Angielski

ISBN: 9781434105288/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
cena: 63,47

 Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special Hash, Joan 9781475027747 Createspace
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special

ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str.

ISBN: 9781475027747/Angielski/Miękka/2012/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Tim Grance; Joan Hash; Jonathan Smith
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
cena: 63,48

 Seguridad en Bases de Datos y Aplicaciones Web Gallardo Aviles, Gabriel 9781511544474 Createspace
Seguridad en Bases de Datos y Aplicaciones Web

ISBN: 9781511544474 / Hiszpański / Miękka / 2015 / 136 str.

ISBN: 9781511544474/Hiszpański/Miękka/2015/136 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Gabriel Gallardo Aviles
Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y competitiva. Muchas veces la TI se utiliza como herramienta basica y de beneficios para la existencia de la organizacion. Por ejemplo, Como seria posible la existencia de una red social como Facebook sin el uso de la TI? Y de una empresa de ventas al por menor on-line sin Amazon o Ebay? La TI no solo forma parte de la estrategia de la empresa como un diferencial, sino que tambien puede ser el principal combustible que hay detras de una organizacion....
Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y compe...
cena: 63,48

 Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal Infrastru Subcommitte 9781514801772 Createspace
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal

ISBN: 9781514801772 / Angielski / Miękka / 2015 / 58 str.

ISBN: 9781514801772/Angielski/Miękka/2015/58 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Infrastru Subcommittee on Cybersecurity
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, China, Russia, and North Korea. Any cyber threat-sharing legislation produced by Congress should enhance existing capabilities and relationships while establishing procedures to safeguard personal privacy. The cyber breach of health insurance giant Anthem exposed the personal information of up to 80 million Americans, approximately 1 in every 4 Americans, demonstrating that the quantity and sophistication of these attacks is only increasing. The...
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, C...
cena: 63,48

 Examining the President's Cybersecurity Information-Sharing Proposal Committee on Homeland Security House of 9781514801864 Createspace
Examining the President's Cybersecurity Information-Sharing Proposal

ISBN: 9781514801864 / Angielski / Miękka / 2015 / 60 str.

ISBN: 9781514801864/Angielski/Miękka/2015/60 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Committee on Homeland Security House of
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially...
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But...
cena: 63,48

 Emerging Threats and Technologies to Protect the Homeland Infrastru Subcommitte 9781514802182 Createspace
Emerging Threats and Technologies to Protect the Homeland

ISBN: 9781514802182 / Angielski / Miękka / 2015 / 62 str.

ISBN: 9781514802182/Angielski/Miękka/2015/62 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Infrastru Subcommittee on Cybersecurity
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from nation-state and organized criminal actors, it is important that each of the components within the Department of Homeland Security rise to the challenge and meet these threats. Privately-owned entities that make up the Nation's critical infrastructure, including our ports, energy networks, chemical manufacturers, transportation and financial sectors, and telecommunication providers, are all vital to our societal and economic well-being. What is...
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from...
cena: 63,48

 Pocket Guide to Keeping your Kids Safe Online: A Practical and Concise Handbook for Parents Nathalie Vaiser   9798370171024 Independently Published
Pocket Guide to Keeping your Kids Safe Online: A Practical and Concise Handbook for Parents

ISBN: 9798370171024 / Angielski

ISBN: 9798370171024/Angielski

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Nathalie Vaiser
cena: 63,48

 Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally Henderson, Lance 9781517160081 Createspace
Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally

ISBN: 9781517160081 / Angielski / Miękka / 2015 / 270 str.

ISBN: 9781517160081/Angielski/Miękka/2015/270 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lance Henderson
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within this book lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever. The Invisibility Toolkit is the ultimate guide for anyone who values their privacy or needs to disappear. Whether you're running from stalkers or...
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within...
cena: 63,64

 Post-Quantum Cryptography Using Complexity Dr Michael James D 9781469959139 Createspace
Post-Quantum Cryptography Using Complexity

ISBN: 9781469959139 / Angielski / Miękka / 2009 / 144 str.

ISBN: 9781469959139/Angielski/Miękka/2009/144 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael James De Mare
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
cena: 63,64

 Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology Lee Badger Tim Grance Robert Patt-Corner 9781477621059 Createspace
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology

ISBN: 9781477621059 / Angielski / Miękka / 2012 / 82 str.

ISBN: 9781477621059/Angielski/Miękka/2012/82 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Lee Badger; Tim Grance; Robert Patt-Corner
cena: 63,64

 The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa Quinn, Stephen 9781478178491 Createspace
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa

ISBN: 9781478178491 / Angielski / Miękka / 2012 / 64 str.

ISBN: 9781478178491/Angielski/Miękka/2012/64 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
David Waltermire; Stephen Quinn; Karen Scarfone
cena: 63,64

 Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800 Arnold Johnson Kelley Dempsey Ron Ross 9781478180197 Createspace
Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800

ISBN: 9781478180197 / Angielski / Miękka / 2012 / 96 str.

ISBN: 9781478180197/Angielski/Miękka/2012/96 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Arnold Johnson; Kelley Dempsey; Ron Ross
cena: 63,64

 Cybersecurity: Authoritative Reports and Resources Rita Tehan 9781478217664 Createspace
Cybersecurity: Authoritative Reports and Resources

ISBN: 9781478217664 / Angielski / Miękka / 2012 / 60 str.

ISBN: 9781478217664/Angielski/Miękka/2012/60 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rita Tehan
cena: 63,64

 Forensic Filtering of Cell Phone Protocols Aurelien Delaitre Wayne Jansen 9781495988042 Createspace
Forensic Filtering of Cell Phone Protocols

ISBN: 9781495988042 / Angielski / Miękka / 2008 / 44 str.

ISBN: 9781495988042/Angielski/Miękka/2008/44 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Aurelien Delaitre; Wayne Jansen
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager protocol exchanges with a device is proposed as a means to reduce risk.
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a pho...
cena: 63,64

 Using the BACnet Communications DLL v1.0 Galler, Michael a. 9781495990519 Createspace
Using the BACnet Communications DLL v1.0

ISBN: 9781495990519 / Angielski / Miękka / 2008 / 32 str.

ISBN: 9781495990519/Angielski/Miękka/2008/32 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Michael a. Galler
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
cena: 63,64

 Recommendation for Applications Using Approved Hash Algorithms: NIST Special Publication 800-107 Revision 1 U. S. Department of Commerce 9781497467859 Createspace
Recommendation for Applications Using Approved Hash Algorithms: NIST Special Publication 800-107 Revision 1

ISBN: 9781497467859 / Angielski / Miękka / 2012 / 28 str.

ISBN: 9781497467859/Angielski/Miękka/2012/28 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Quynh Dang;U. S. Department of Commerce
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. Th...
cena: 63,64

 Cybersecurity: Authoritative Reports and Resources, by Topic Rita Tehan 9781502998385 Createspace
Cybersecurity: Authoritative Reports and Resources, by Topic

ISBN: 9781502998385 / Angielski / Miękka / 2014 / 106 str.

ISBN: 9781502998385/Angielski/Miękka/2014/106 str.

Termin realizacji zamówienia: ok. 16-18 dni roboczych.
Rita Tehan
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups. <...
cena: 63,64

Podprzednia  37  38  39  Następna

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia