
ilość książek w kategorii: 5021
![]() |
Code Red: The Unbreakable Cipher
ISBN: 9798306855646 / Angielski / Miękka / 2025 / 276 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Firewall Configuration and Management: Advanced Strategies for Securing Your Network
ISBN: 9798304357562 / Angielski / Miękka / 2025 / 298 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
IoT Security Best Practices: Protecting Connected Devices in a Digital World
ISBN: 9798306147260 / Angielski / Miękka / 2025 / 290 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Cybersecurity Risk Management Frameworks: Identifying and Mitigating Organizational Risks
ISBN: 9798306264066 / Angielski / Miękka / 2025 / 268 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Digital Forensics and Incident Investigation: Techniques for Analyzing Cyber Incidents and Evidence
ISBN: 9798306264073 / Angielski / Miękka / 2025 / 300 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Zero Trust Architecture Implementation: Modern Security Models for Enhanced Protection
ISBN: 9798306487694 / Angielski / Miękka / 2025 / 228 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Introduction to Ethical Hacking and Penetration Testing: Protect Your Systems by Understanding Cybersecurity Attacks
ISBN: 9798307477922 / Angielski / Miękka / 2025 / 280 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Threat Intelligence and Cyber Defense: Proactive Strategies for Emerging Threats
ISBN: 9798307711767 / Angielski / Miękka / 2025 / 304 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Security Compliance and Regulatory Standards: Navigating and Implementing Cybersecurity Regulations
ISBN: 9798307713341 / Angielski / Miękka / 2025 / 288 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Building Scalable Microservices with Kubernetes: Deploy, Manage, and Scale Microservices Using Kubernetes
ISBN: 9798308058090 / Angielski / Miękka / 2025 / 238 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
| |
Bug Hunt: Tracking Errors in the Linux Wilderness
ISBN: 9798308670667 / Angielski / Miękka / 2025 / 264 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
The Cybersecurity Blueprint: Protecting Your Systems Against Emerging Threats
ISBN: 9798308808558 / Angielski / Miękka / 2025 / 254 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
KI-Sicherheit in der Praxis: Angriffe, Risiken, Verteidigungsstrategien
ISBN: 9783954443024 / Niemiecki Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,56 |
![]() |
Corporate Cyberwar (Mandarin)
ISBN: 9789810713461 / Chiński / Miękka / 2012 / 68 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,60 |
![]() |
Corporate Cyberwar
ISBN: 9789810897574 / Angielski / Miękka / 2011 / 60 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,60 |
![]() |
Cyber Escroquerie: L`art Spectaculaire De FOUR-ONE-NINE
ISBN: 9781495437601 / Francuski / Miękka / 2014 / 204 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Ce livre vous permettra de decouvrir la cyber arnaque (cyber criminalite), tel que vous ne l'auriez jamais imagine. Il permettra de la mettre a nu et d'eclaircir les points d' ombres suivants: - Pourquoi l'escroquerie est-elle un enorme succes planetaire - Les litiges frequents entre les fraudeurs et comment ils les reglent. - Leurs motivations. - leur organisation. - les categories d'arnaqueurs - Comment font-ils pour depenser leur argent - Comment les arnaqueurs utilisent la sorcellerie pour escroquer - Les avantages et les inconvenients de l'arnaque cyberique. - Comment finissent la...
Ce livre vous permettra de decouvrir la cyber arnaque (cyber criminalite), tel que vous ne l'auriez jamais imagine. Il permettra de la mettre a nu et ...
|
cena:
79,60 |
![]() |
The Next Generation of Video Surveillance And Video Analytics: The Unified Intelligent Video Analytics Suite
ISBN: 9781516995752 / Angielski / Miękka / 2014 / 98 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The field of electronic surveillance has matured significantly over the past 2 decades, fuelled by the growth of safety and security concerns around the world. Surveillance cameras are being used for a wide variety of applications from national security to securing the home. Video analytics, also called intelligent video surveillance, is a technology that uses software to automatically identify specific objects, behaviours or attitudes in video footage. It transforms the video into data to be transmitted or archived so that the video surveillance system can act accordingly. It may involve...
The field of electronic surveillance has matured significantly over the past 2 decades, fuelled by the growth of safety and security concerns around t...
|
cena:
79,60 |
![]() |
NSA Encryption Devices: Encryption Systems of the National Security Agency
ISBN: 9781519223432 / Angielski / Miękka / 2015 / 128 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products.
The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of ...
|
cena:
79,60 |
![]() |
How Privacy Keeps You From Tindering: To swipe or not to swipe!: Privacy and The Law
ISBN: 9781539753223 / Angielski / Miękka / 2016 / 64 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data that we give them for their own benefit? This book will look at an indepth analysis of Tinder's privacy policy and whether or not it protects our rights. It also gives us a clear understanding of how much information the user is willing to share.
What do we mean when we say Privacy? Are any of us actually protected? Does Tinder follow their privacy policy in detail or do they take all the data ...
|
cena:
79,60 |
![]() |
Kompendium der Kryptologie: Die Welt der elektronischen Sicherheit in Theorie und Praxis
ISBN: 9781535321112 / Niemiecki / Miękka / 2017 / 528 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
79,60 |