
ilość książek w kategorii: 5045
![]() |
Blockchain Applications: A Hands-On Approach
ISBN: 9780996025560 / Angielski / Twarda / 2017 / 382 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
331,12 |
![]() |
Bio-Inspired Computing for Information Retrieval Applications
ISBN: 9781522523758 / Angielski / Twarda / 2017 / 420 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Presents the latest advances and research regarding current techniques that have evolved from biologically-inspired processes and its application to a variety of problems. Highlighting multidisciplinary studies on data processing, swarm-based clustering, and evolutionary computation, this publication is a reference source for researchers, academics, professionals, students, and practitioners.
Presents the latest advances and research regarding current techniques that have evolved from biologically-inspired processes and its application to a...
|
cena:
1062,11 |
![]() |
Python Scapy Dot11: Programacion en Python para pentesters Wi-Fi
ISBN: 9781542748704 / Hiszpański / Miękka / 2017 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
122,50 |
![]() |
Social Media Warfare: Equal Weapons for All
ISBN: 9781138036024 / Angielski / Twarda / 2017 / 303 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
326,49 |
![]() |
Policing America's Educational Systems
ISBN: 9781498784986 / Angielski / Miękka / 2019 / 230 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
207,75 |
![]() |
A History of Cyber Security Attacks: 1980 to Present
ISBN: 9781498785860 / Angielski / Twarda / 2017 / 239 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Stories of cyber attacks dominate the headlines. Whether its theft of massive amounts of personally identifible information or the latest intrustion of foreign goverments in US goverment and industrial sites, cyber attacks are now important. For professionals and the public, knowing how the attacks are lauched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and... Stories of cyber attacks dominate the headlines. Whether its theft of massive amounts of personally identifible information or the latest intrustio... |
cena:
326,49 |
![]() |
Securing Government Information and Data in Developing Countries
ISBN: 9781522517030 / Angielski / Twarda / 2017 / 332 str. Termin realizacji zamówienia: ok. 30 dni roboczych. -This book aims at analyzing impact of such changes in developing countries on the information and data generated, owned and maintained by the government. The book focus on the challenges, weaknesses and problems that may be faced by technology leadership in the governments, such as the GCIO's and similar leaders---
-This book aims at analyzing impact of such changes in developing countries on the information and data generated, owned and maintained by the governm...
|
cena:
828,07 |
![]() |
Red Team: An Attack Paradigm
ISBN: 9781542785068 / Angielski / Miękka / 2017 / 212 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
159,52 |
![]() |
The Future of Violence - Robots and Germs, Hackers and Drones: Confronting the New Age of Threat
ISBN: 9781445666686 / Angielski / Miękka / 2017 / 336 str. Termin realizacji zamówienia: ok. 8-10 dni roboczych. The terrifying new role of technology in a world at war
The terrifying new role of technology in a world at war
|
cena:
55,97 |
![]() |
INFORMATION AS POWER CHINA'S CYBER POWER and AMERICA'S NATIONAL SECURITY
ISBN: 9781544057170 / Angielski / Miękka / 2017 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The Information in Warfare Group of the U.S. Army War College is proud to publish "China's Cyber Power and America's National Security" by Colonel Jayson M. Spade. This effort represents the first research paper published outside the annual "Information as Power" student anthology as a stand-alone monograph. There are several reasons for this distinction. Spade's work is exceptionally well-researched and written as evidenced by its receipt of the Armed Forces Communications and Electronics Association (AFCEA) writing award in 2011. Additionally, the topic of cyber power and national security...
The Information in Warfare Group of the U.S. Army War College is proud to publish "China's Cyber Power and America's National Security" by Colonel Jay...
|
cena:
36,77 |
![]() |
Tor: Exactly How to Remain Invisible on the Anonymous Deep Web
ISBN: 9781544001661 / Angielski / Miękka / 2017 / 82 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Looking to surf the deep web anonymously? Want to learn about the TOR browser? Then this book is for you. Be Anonymous, Forever Your privacy is important, but the government organizations such as the NSA think otherwise. That's why TOR is such an essential tool - it warrants your privacy and leaves you untraceable. In this book, you will be thought exactly how you can remain completely anonymous using TOR. Because even on an encrypted browser like TOR, the NSA or FBI is able to see what you're doing. However, I've got some nifty tools that can circumvent most... Looking to surf the deep web anonymously? Want to learn about the TOR browser? Then this book is for you. Be Anonymous, Forever |
cena:
67,00 |
![]() |
Blockchain & FinTech: A Comprehensive Blueprint to Understanding Blockchain & Financial Technology. 2 Books in 1.
ISBN: 9781543287677 / Angielski / Miękka / 2017 / 126 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Blockchain
In 2008, work began on one of the most ambitious and liberating software projects to date. Satoshi Yakamoto put forward a paper detailing something called a cryptocurrency and how digital currencies could be created and given to one another without a central authority in the middle keeping track of every transaction. These technologies, bitcoin and blockchain, have changed the face of the web - and the world - forever. This book is going to teach you all about blockchain and its potential to change the world. This technology, though new, is baffling experts and has... Blockchain
In 2008, work began on one of the most ambitious and liberating software projects to date. Satoshi Yakamoto put forward a paper... |
cena:
99,72 |
![]() |
Blockchain: The Untapped Goldmine Of Blockchain That Virtually No One Knows About
ISBN: 9781543188660 / Angielski / Miękka / 2017 / 124 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Blockchain is the new and revolutionary way to make transactions locally and internationally. It negates a need for a centralized authority such a government or a bank and becomes more secure with each added use. With its transparency for customers and benefits for banks and other financial institutions too, Blockchain is primed to become a major player in the world of finance. Now, with Blockchain: The Untapped Goldmine of Blockchain that Virtually No One Knows About, you can learn all about this groundbreaking new system with chapters giving you:... Blockchain is the new and revolutionary way to make transactions locally and internationally. It negates a need for a centralized authority such a ... |
cena:
53,09 |
![]() |
Hacking With Python: The Complete and Easy Guide to Ethical Hacking, Python Hacking, Basic Security, and Penetration Testing - Learn How to
ISBN: 9781543185881 / Angielski / Miękka / 2017 / 108 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. Do you want to learn how to hack? Do you want to learn how to become anonymous online? Then this book is right for you Whether you are a complete beginner or a hacking Maestro, you will find that this book is jam-packed with all the essential information on hacking Best-selling author, Joshua Welsh, presents his new book: Hacking With Python In this book, you will learn: - Hacking 101 - Setting Up for Hacking - Hacking Tools - Fooling Your Target - Cracking a Password - Hacking a Network Connection - Mobile Hacking - Man in the Middle Attack - Hiding and Finding an IP Address - Top 10 Cyber...
Do you want to learn how to hack? Do you want to learn how to become anonymous online? Then this book is right for you Whether you are a complete beg...
|
cena:
67,00 |
![]() |
Der Paketfilter bei OpenWrt
ISBN: 9781542690645 / Niemiecki / Miękka / 2017 / 226 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat eignet es sich auch fur andere Projekte mit der unterstutzten Hardware. Somit sind die Hurden, einen Router mit OpenWrt zu betreiben, sehr gering. Dabei sollte nicht auer Acht gelassen werden, dass mit einem schlecht gewarteten Router sehr leicht beinahe jeder Zugriff auf die angeschlossenen Netzwerke und die darin enthaltenen Gerate erlangen kann. Hier kann man mit dem in OpenWrt enthaltenen Paketfilter regulierend eingreifen.Wenn man die...
OpenWrt bietet sich als alternatives Betriebssystem an fur SOHO-Router, die nicht mehr oder zu selten aktualisiert werden. Aufgrund seiner Modularitat...
|
cena:
81,40 |
![]() |
Privacy and Security Policies in Big Data
ISBN: 9781522524861 / Angielski / Twarda / 2017 / 332 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. "This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes various real time/offline applications and case studies in the field of engineering, computer science, information security, cloud computing with modern tools and technologies used"--
"This book covers the fundamental concepts of big data management and analytics along with recent research development in big data. It also includes v...
|
cena:
1088,01 |
![]() |
Cybersecurity for Beginners
ISBN: 9781911452133 / Angielski / Twarda / 2017 / 224 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. 'The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart... This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person ... |
cena:
117,76 |
![]() |
Advanced Image-Based Spam Detection and Filtering Techniques
ISBN: 9781683180135 / Angielski / Twarda / 2017 / 228 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. |
cena:
906,68 |
![]() |
Intrusion Detection and Prevention for Mobile Ecosystems
ISBN: 9781138033573 / Angielski / Twarda / 2017 / 544 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detection and prevention for mobile networks, services, and devices. It will include chapters dealing with fundamental theory, techniques, applications, as well as practical experiences concerning intrusion detection and prevention for the mobile ecosystem will be considered. Surveys, simulations, practical results and case studies would be also included. The objective of this edited book is to solicit state-of-the-art contributions from both scientists and practitioners working in intrusion detectio... |
cena:
667,93 |
![]() |
How to Secure Your Computer
ISBN: 9781477660287 / Angielski / Miękka / 2013 / 50 str. Termin realizacji zamówienia: ok. 16-18 dni roboczych. How to Secure Your Computer tells you how to test the vulnerability of your computer and strengthen its security. Follow our -Hassle Free- approach to protecting your confidential information and computing resources. Protect yourself and your family. Keep cybercriminals from accessing, stealing or destroying your digital assets
How to Secure Your Computer tells you how to test the vulnerability of your computer and strengthen its security. Follow our -Hassle Free- approach to...
|
cena:
24,34 |