
ilość książek w kategorii: 5023
![]() |
The Cybersecurity Framework - DRAFT NISTIR 8170: Implementation Guidance for Federal Agencies
ISBN: 9781547074358 / Angielski / Miękka / 2017 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,28 |
![]() |
Künstliche Intelligenz: Von Werkzeug zu Partner der Menschheit: Die Evolution der Mensch-Maschine-Beziehungen: Herausforderungen, Chancen und neue Horizonte
ISBN: 9798341395800 / Niemiecki / Miękka / 2024 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,28 |
![]() |
Cloud Computing Service Metrics Descriptions: NiST SP 500-307
ISBN: 9781718787773 / Angielski / Miękka / 2018 / 46 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,40 |
![]() |
Security Guide for Interconnecting Information Technology Systems: Recommendations of the National Institute of Standards and Technology: NIST Special
ISBN: 9781475027747 / Angielski / Miękka / 2012 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating interconnections between information technology (IT) systems that are owned and operated by different organizations. The guidelines are consistent with the requirements specified in the Office of Management and Budget (OMB) Circular A-130, Appendix III, for system interconnection and information sharing. A system interconnection is defined as the direct connection of two or more IT systems for the purpose of sharing data and other information...
The Security Guide for Interconnecting Information Technology Systems provides guidance for planning, establishing, maintaining, and terminating inter...
|
cena:
63,48 |
![]() |
Seguridad en Bases de Datos y Aplicaciones Web
ISBN: 9781511544474 / Hiszpański / Miękka / 2015 / 136 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y competitiva. Muchas veces la TI se utiliza como herramienta basica y de beneficios para la existencia de la organizacion. Por ejemplo, Como seria posible la existencia de una red social como Facebook sin el uso de la TI? Y de una empresa de ventas al por menor on-line sin Amazon o Ebay? La TI no solo forma parte de la estrategia de la empresa como un diferencial, sino que tambien puede ser el principal combustible que hay detras de una organizacion....
Actualmente no es posible imaginarnos a una organizacion sin que la misma no utilice la Tecnologia de la Informacion (TI) de forma estrategica y compe...
|
cena:
63,48 |
![]() |
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801772 / Angielski / Miękka / 2015 / 58 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, China, Russia, and North Korea. Any cyber threat-sharing legislation produced by Congress should enhance existing capabilities and relationships while establishing procedures to safeguard personal privacy. The cyber breach of health insurance giant Anthem exposed the personal information of up to 80 million Americans, approximately 1 in every 4 Americans, demonstrating that the quantity and sophistication of these attacks is only increasing. The...
For years, the private sector has been on the front line battling devastating cyber attacks from criminals, activists in nation-states such as Iran, C...
|
cena:
63,48 |
![]() |
Examining the President's Cybersecurity Information-Sharing Proposal
ISBN: 9781514801864 / Angielski / Miękka / 2015 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But today, American prosperity depends as much on defending those networks as it does on expanding them. Every day, our country faces digital intrusions from criminals, activists, terrorists, and nation-states like Russia, China, and Iran. The impact of those intrusions are felt everywhere; from our National security secrets to the personal information of Americans. We cannot tolerate acts of cyber vandalism, theft, or cyber warfare, especially...
At the dawn of the digital age, our Nation saw endless opportunities to generate prosperity by expanding our networks and connecting to the world. But...
|
cena:
63,48 |
![]() |
Emerging Threats and Technologies to Protect the Homeland
ISBN: 9781514802182 / Angielski / Miękka / 2015 / 62 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from nation-state and organized criminal actors, it is important that each of the components within the Department of Homeland Security rise to the challenge and meet these threats. Privately-owned entities that make up the Nation's critical infrastructure, including our ports, energy networks, chemical manufacturers, transportation and financial sectors, and telecommunication providers, are all vital to our societal and economic well-being. What is...
Given the recent alarming terrorist attacks in Paris, the increase in violent extremist activity across Europe, and the increase in cyber attacks from...
|
cena:
63,48 |
![]() |
Pocket Guide to Keeping your Kids Safe Online: A Practical and Concise Handbook for Parents
ISBN: 9798370171024 / Angielski Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,48 |
![]() |
Invisibility Toolkit - 100 Ways to Disappear From Oppressive Governments, Stalke: How to Disappear and Be Invisible Internationally
ISBN: 9781517160081 / Angielski / Miękka / 2015 / 270 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within this book lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever. The Invisibility Toolkit is the ultimate guide for anyone who values their privacy or needs to disappear. Whether you're running from stalkers or...
Your sovereignty is under attack You don't need the red pill to see it because you've already been unplugged. It's all around you. Everywhere. Within...
|
cena:
63,64 |
![]() |
Post-Quantum Cryptography Using Complexity
ISBN: 9781469959139 / Angielski / Miękka / 2009 / 144 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive version of 3SAT-based cryptography. Subsequent research into 3SAT revealed the appropriate constants to make 3SAT-based cryptography work.
This is the version of Michael James de Mare's PhD thesis submitted to his Ph.D. defense in 2009. It includes the Dragonfire cipher and a primitive ve...
|
cena:
63,64 |
![]() |
Cloud Computing Synopsis and Recommendations: Recommendations of the National Institute of Standards and Technology
ISBN: 9781477621059 / Angielski / Miękka / 2012 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,64 |
![]() |
The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.2: Recommendations of the National Institute of Standa
ISBN: 9781478178491 / Angielski / Miękka / 2012 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,64 |
![]() |
Guide for Security-Focused Configuration Management of Information Systems: The National Institute of Standards and Technology Special Publication 800
ISBN: 9781478180197 / Angielski / Miękka / 2012 / 96 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,64 |
![]() |
Cybersecurity: Authoritative Reports and Resources
ISBN: 9781478217664 / Angielski / Miękka / 2012 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
63,64 |
![]() |
Forensic Filtering of Cell Phone Protocols
ISBN: 9781495988042 / Angielski / Miękka / 2008 / 44 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a phone, using one or more of the communications protocols supported by the phone. Phone managers are sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager protocol exchanges with a device is proposed as a means to reduce risk.
Phone managers are non-forensic software tools designed to carry out a range of tasks for the user, such as reading and updating the contents of a pho...
|
cena:
63,64 |
![]() |
Using the BACnet Communications DLL v1.0
ISBN: 9781495990519 / Angielski / Miękka / 2008 / 32 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control system. The BACnet Communications Dynamically Linked Library (DLL) enables researchers to implement selected BACnet communications, creating an interface for data collection that is easy to use. Researchers can integrate the BACnet Communications DLL (BCD) into existing tools, create a new tool with the BCD, or use the BCD with common data acquisition and analysis tools. The BCD has already been used to collect data in a variety of locations.
The BACnet standard 1] defines a communication protocol for information exchange between components of a distributed building automation and control ...
|
cena:
63,64 |
![]() |
Recommendation for Applications Using Approved Hash Algorithms: NIST Special Publication 800-107 Revision 1
ISBN: 9781497467859 / Angielski / Miękka / 2012 / 28 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. This document provides security guidelines for achieving the required or desired security strengths when using cryptographic applications that employ the approved hash functions specified in Federal Information Processing Standard (FIPS) 180-4. These include functions such as digital signatures, Keyed-hash Message Authentication Codes (HMACs) and Hash-based Key Derivation Functions (Hash-based KDFs).
Hash functions that compute a fixed-length message digest from arbitrary length messages are widely used for many purposes in information security. Th...
|
cena:
63,64 |
![]() |
Cybersecurity: Authoritative Reports and Resources, by Topic
ISBN: 9781502998385 / Angielski / Miękka / 2014 / 106 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups.
This report provides references to analytical reports on cybersecurity from CRS, other government agencies, trade associations, and interest groups.
<...
|
cena:
63,64 |