
ilość książek w kategorii: 5045
![]() |
The Encrypted Pocketbook of Passwords
ISBN: 9781911452089 / Angielski / Miękka / 2016 / 122 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using one or more secret keys to help keep the password information secure, even if the book itself is accessed or stolen. Some people re-use the same password across many different online accounts. For security reasons, this is highly dangerous and inadvisable. This is because, if any cyber criminal steals your username and password information from one place, one of the first things they usually do is to try those same details in many other... A password journal with a major difference An alphabetized storage solution for over 200 separate account, username and password details, using on... |
cena:
25,91 |
| |
Cyber Conflict After Stuxnet: Essays from the Other Bank of the Rubicon
ISBN: 9780989327442 / Angielski / Miękka / 2016 / 206 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
69,80 |
![]() |
Quantum Information Theory
ISBN: 9781107176164 / Angielski / Twarda / 2017 / 776 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Developing many of the major, exciting, pre- and post-millennium developments from the ground up, this book is an ideal entry point for graduate students into quantum information theory. Significant attention is given to quantum mechanics for quantum information theory, and careful studies of the important protocols of teleportation, superdense coding, and entanglement distribution are presented. In this new edition, readers can expect to find over 100 pages of new material, including detailed discussions of Bell's theorem, the CHSH game, Tsirelson's theorem, the axiomatic approach to quantum...
Developing many of the major, exciting, pre- and post-millennium developments from the ground up, this book is an ideal entry point for graduate stude...
|
cena:
320,34 |
![]() |
PCI Dss: A Pocket Guide
ISBN: 9781849288439 / Angielski / Miękka / 2016 / 76 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs trying to steal financial information and commit identity fraud. The PCI DSS (Payment Card Industry Data Security Standard) exists to ensure that businesses process credit and debit card orders in a way that effectively protects cardholder data. All organisations that accept, store, transmit or process cardholder data must comply with the Standard; failure to do so can have serious consequences for their ability to process card payments. Product...
An ideal introduction and a quick reference to PCI DSS version 3.2 All businesses that accept payment cards are prey for hackers and criminal gangs tr...
|
cena:
61,15 |
![]() |
CISSP in 21 Days, Second Edition
ISBN: 9781785884498 / Angielski / Miękka / 2016 / 402 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
213,74 |
![]() |
Linux Networking Cookbook
ISBN: 9781785287916 / Angielski / Miękka / 2016 / 152 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
170,11 |
| |
Kali Linux 2: Windows Penetration Testing: Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working ha
ISBN: 9781782168492 / Angielski / Miękka / 2016 / 422 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
239,91 |
![]() |
Hacking University: Freshman Edition: Essential Beginner's Guide on How to Become an Amateur Hacker (Hacking, How to Hack, Hacking for Beg
ISBN: 9781535445023 / Angielski / Miękka / 2016 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you?
This book contains demonstrations of hacking techniques and actual code. Aspiring hackers can follow along to get a feel for how professions operate, and persons wishing to hide... Have you ever wanted to be a hacker? Does cracking passwords and the exfiltration of data intrigue you? |
cena:
53,13 |
![]() |
Hacking: The Ultimate Beginners Handbook
ISBN: 9781533530264 / Angielski / Miękka / 2016 / 52 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Ultimate Computer Hacking Handbook
Have you ever wanted to learn how to hack? Hacking: The Ultimate Beginners Handbook, contains tons of tips and strategies on how to hack. This step by step guide will teach you everything you need to know about hacking. This book also studies the best hackers that have ever lived and their experiences. Become a hacking master today Here Is A Preview Of What You'll Learn...
The Ultimate Computer Hacking Handbook
Have you ever wanted to learn how to hack? Hacking: The Ultimate Beginners Handbook, contains tons of tip... |
cena:
151,29 |
![]() |
The Insider Threat: Assessment and Mitigation of Risks
ISBN: 9781498747080 / Angielski / Twarda / 2018 / 230 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
356,18 |
![]() |
Protecting Mobile Networks and Devices: Challenges and Solutions
ISBN: 9781498735834 / Angielski / Twarda / 2016 / 336 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment. This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related t... |
cena:
380,92 |
![]() |
Computer Security for The Every Day User: Every day computer security
ISBN: 9781533210920 / Angielski / Miękka / 2016 / 42 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
49,09 |
![]() |
Knowledge-Base Assisted Database Retrieval Systems
ISBN: 9789810218508 / Angielski / Twarda / 1996 / 248 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This work covers areas including: artificial intelligence and database systems; natural language database queries processing; intelligent query guidance systems; imprecise queries analysis; handling of users' misconceptions; direct answer and co-operative response; and knowledge acquisition.
This work covers areas including: artificial intelligence and database systems; natural language database queries processing; intelligent query guidan...
|
cena:
390,86 |
![]() |
Database Systems for Advanced Applications '97 - Proceedings of the 5th International Conference on Database Systems for Advanced Applications
ISBN: 9789810231071 / Angielski / Twarda / 1997 / 560 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This volume contains the proceedings of the Fifth International Conference on Database Systems for Advanced Applications (DASFAA '97). DASFAA '97 focused on advanced database technologies and their applications. The 55 papers in this volume cover a wide range of areas in the field of database systems and applications - including the rapidly emerging areas of the Internet, multimedia, and document database systems - and should be of great interest to all database system researchers and developers, and practitioners.
This volume contains the proceedings of the Fifth International Conference on Database Systems for Advanced Applications (DASFAA '97). DASFAA '97 focu...
|
cena:
613,50 |
![]() |
Image: E-Learning, Understanding, Information Retrieval, Medical - Proceedings of the First International Workshop
ISBN: 9789812385871 / Angielski / Twarda / 2003 / 220 str. Termin realizacji zamówienia: ok. 30 dni roboczych. This volume emphasizes the primary role played by images in computer science. In the last two decades images have replaced written texts and the enormous possibilities of the image language have overcome written language in an ever-more-restricted ambit.
This volume emphasizes the primary role played by images in computer science. In the last two decades images have replaced written texts and the enorm...
|
cena:
559,08 |
![]() |
Cybersecurity: Home and Small Business
ISBN: 9781911452041 / Angielski / Miękka / 2016 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, accounts, mobile devices and other connected technologies compromised. In the fraction of a second since you started to read this, more people, businesses and other organizations of all sizes have had their computers, ... |
cena:
47,95 |
![]() |
The Handbook of Financial Communication and Investor Relations
ISBN: 9781119240785 / Angielski / Twarda / 2017 / 544 str. Termin realizacji zamówienia: ok. 30 dni roboczych. |
cena:
859,06 |
![]() |
Windows Forensics
ISBN: 9781535312431 / Angielski / Miękka / 2016 / 554 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Windows Forensics is the most comprehensive and up-to-date resource for those wishing to leverage the power of Linux and free software in order to quickly and efficiently perform forensics on Windows systems. It is also a great asset for anyone that would like to better understand Windows internals. Windows Forensics will guide you step by step through the process of investigating a computer running Windows. Whatever the reason for performing forensics on a Windows system, be it incident response, a criminal... Windows Forensics is the most comprehensive and up-to-date resource for those wishing to leverage the power of Li... |
cena:
200,42 |
![]() |
Ransomware: Defending Against Digital Extortion
ISBN: 9781491967881 / Angielski / Miękka / 2017 / 190 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for... The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay... |
cena:
155,78 |
![]() |
The Internet of Risky Things: Trusting the Devices That Surround Us
ISBN: 9781491963623 / Angielski / Miękka / 2017 / 240 str. Termin realizacji zamówienia: ok. 30 dni roboczych. By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the way we built the current internet and other information technology initiatives, we're headed for trouble. With a focus on concrete solutions, The Internet of Risky Things explains how we can avoid simple flaws that have plagued several dramatic IT advances in recent decades. Developers,... By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. I... |
cena:
111,97 |